Internet 3

Associations
Banana
1 / 10
next
Slide 1: Slide
EnglishVocational Education

This lesson contains 10 slides, with interactive quizzes and text slides.

Items in this lesson

Associations
Banana

Slide 1 - Slide

Word ladder
1. Cold              1. Head
2.                        2.
3.                        3.
4.                        4. 
5. Warm           5. 
                             6. Tail

Slide 2 - Slide

Most threats are successful due to two main weaknesses
A
Social
B
Technical
C
Machine
D
Human

Slide 3 - Quiz

Release of private information, such as email leaks, intimate photos, and significant corporate data leaks.
A
Man in the middle attack
B
Adware
C
Pharming
D
Unauthorized data disclosure

Slide 4 - Quiz


Online blackmail is also known as ...
A
Cyber extortion
B
DDoS
C
Account takeover
D
Brute force attack

Slide 5 - Quiz


Malware is short for

Slide 6 - Open question

Name social
engineering attacks

Slide 7 - Mind map

Open email attachments from unknown senders
Use unsecure WiFi networks in public places
Update your software and operating system
 Post any private or sensitive information
 Install unauthorized programs on your work computer
Do's
Don'ts
Use privacy settings on social media sites
 Report all suspicious activity
Lock your computer and phone when not in use

Slide 8 - Drag question

Slide 9 - Link

Slide 10 - Slide