L5 - No place like 127.0.0.1

L5 - No place like 127.0.0.1
1 / 25
volgende
Slide 1: Tekstslide
ComputingLower Secondary (Key Stage 3)

In deze les zitten 25 slides, met interactieve quizzen, tekstslides en 1 video.

Onderdelen in deze les

L5 - No place like 127.0.0.1

Slide 1 - Tekstslide

Search google for Lessonup.app
Enter the Code

Slide 2 - Tekstslide

Slide 3 - Tekstslide

Trojans, spyware, adware are all types of...
Viruses
Malware
Ransomware
?

Slide 4 - Poll

Malware is an umbrella term for all software that has malicious intent

Slide 5 - Tekstslide

What is the term for when human users are tricked into providing confidential information?
Social engineering
Phishing
Hacked
?

Slide 6 - Poll

  • Social engineering in cybersecurity is the psychological manipulation of people into performing actions or divulging confidential information.

  • It is responsible for roughly 90% of data breaches

  • Deception through phishing, blagging, shouldering, or impersonation to bypass security protocols. 

Slide 7 - Tekstslide

What is the term for a large collection of malware infected devices used to attack or exploit known weaknesses in a system?
DDoS
Botnet
Penetration testing
?

Slide 8 - Poll

  • A botnet is a network of internet-connected, malware-infected devices

  • These "zombie" computers are used to launch large-scale, malicious attacks, including DDoS, data theft, phishing, and spreading malware. 

Slide 9 - Tekstslide

Think - Pair - Share
  • What do you think are the most targeted industries of cyberattacks?

  • What do you think are the most used malware types?

  • In the UK what Malware trend do you think makes up the largest percentage of attacks?


Slide 10 - Tekstslide

  • Most targeted industries: Education, telecommunications, and government are attacked the most.

  • Most common malware types: Phishing scams, adware, and mobile malware.

  • UK malware trend: Botnet attacks make up the largest share of cyber attacks in the UK.

Slide 11 - Tekstslide

Impact
Probability
Plot on the graph where you think each of these cyber threats belongs
Virus
DDoS
Social engineering
Worms

Slide 12 - Sleepvraag

Slide 13 - Video

Slide 14 - Tekstslide

How can we protect ourselves from cyber security threats?

Slide 15 - Open vraag

Slide 16 - Tekstslide

Slide 17 - Tekstslide

Why is it especially important for a school network to have a strict firewall?
A
To block all websites that aren’t related to education.
B
To protect sensitive student information and prevent malware from spreading across the network.
C
To automatically back up student work to a secure server.
D
?

Slide 18 - Quizvraag

Slide 19 - Tekstslide

Slide 20 - Tekstslide

Slide 21 - Tekstslide

Slide 22 - Tekstslide

What makes this email look official at first glance?

How can we tell this email is not legitimate?

What type of cyber attack is this?

What should you do instead of clicking the link in this email?

Slide 23 - Tekstslide

What risks are involved in downloading games from websites like this?

How can you best protect against other people downloading software from this website on your computer?

Slide 24 - Tekstslide

Click the link below


Play through the game and get the highest score possible

Slide 25 - Tekstslide