Network Threats

Unit 4.1 Network Threats
1 / 34
volgende
Slide 1: Tekstslide
ComputingUpper Secondary (Key Stage 4)GCSE

In deze les zitten 34 slides, met interactieve quizzen en tekstslides.

time-iconLesduur is: 50 min

Onderdelen in deze les

Unit 4.1 Network Threats

Slide 1 - Tekstslide

1. Why do we comment our code?
2. Convert 1010 from binary to denary.
3. Explain the programming construct selection.
4. What Python function would we use for selection?

Slide 2 - Open vraag

Lesson Objectives

Conquer: Understand forms of attack and threats posed to a network.

Aspire: Evaluate methods to defend against these attacks.​



Slide 3 - Tekstslide

Malware
Malware comes from two words:​

  • Malicious – to cause an act of harm.​
  • Software – programs that run on the computer.​

Malware – software designed to damage, disrupt, or gain access to a computer system.​






Slide 4 - Tekstslide

Malware - Viruses
Computer viruses infect computers​. 
  • They replicate their code in other programs​.
  • They infect other computers​ if sent to them.
  • They harm the computer by deleting,​ corrupting, or modifying files​.



Slide 5 - Tekstslide

Malware - Worms
Computer viruses infect computers​. 
  • They replicate their code without needing other programs​ to attach to.

  • They might not harm the computer, but they slow everything down as they replicate using up more of the computer/network resources​.



Slide 6 - Tekstslide

Malware - Trojan Horse
There is ​a story that during the Trojan War, the Greeks made a ​wooden horse and hid men inside.​

Computer Trojans are similar:​
  • They have a program, game or cracked​ file which
    is something the user wants​.
  • They have negative program code which​ causes
    damage, takes control, or provides​ access to the
    computer​.



Slide 7 - Tekstslide

Malware - Ransomware
Ransomware is software which:​

  • Holds a computer hostage by locking or ​encrypting access to it​.
  • If the data is encrypted, not even​ a cyber security professional will ​be able to recover the data unless ​backups are available​.
  • Once a ransom is paid to the ​attacker, access is restored (sometimes)​.



Slide 8 - Tekstslide

Why do you think the ransomware attacking key infrastructure is important?

Slide 9 - Open vraag

Tyler goes to a website that says that it will supply cracked software that doesn’t need a licence. After installing the software, the user is pleased as it works as expected. They notice later that many adverts display on their computer.
A
Virus
B
Worm
C
Trojan
D
Ransomware

Slide 10 - Quizvraag

Leila clicked on a file in an email attachment. Today, when she turned on her computer it said that all her files are now encrypted. She has been given 24 hours to pay one bitcoin to unencrypt the files.
A
Virus
B
Worm
C
Trojan
D
Ransomware

Slide 11 - Quizvraag

Richard has downloaded a file from the Internet and run it. After a short while he has noticed that many of the files on his computer have been deleted or corrupted.
A
Virus
B
Worm
C
Trojan
D
Ransomware

Slide 12 - Quizvraag

A program has been written that targets computers on the Internet. It automatically replicates itself, and whilst it doesn’t harm any individual computers, it does slow down the network.
A
Virus
B
Worm
C
Trojan
D
Ransomware

Slide 13 - Quizvraag

1. What two words are combined make the term malware?
2. Name four types of malware.
3. How does ransomware work?

Slide 14 - Open vraag

Exploiting Vulnerabilities
  1. Unpatched software 
  2. Out-of-date anti-malware 
  3. Social Engineering - Asking people for the information.

Slide 15 - Tekstslide

Phishing
Phishing is a type of social engineering technique.

Emails, texts or phone calls are sent to users commonly pretending to be from a bank or website. 

Slide 16 - Tekstslide

Phishing
Things to look out for:
  • The ‘From’ email address may be forged
  • These messages will try to get personal information such as:
  • Usernames
  • Passwords
  • Credit cards details
  • Other personal information

Slide 17 - Tekstslide

Phishing

Slide 18 - Tekstslide

Slide 19 - Tekstslide

Slide 20 - Tekstslide

Slide 21 - Tekstslide

Slide 22 - Tekstslide

Slide 23 - Tekstslide

Slide 24 - Tekstslide

Slide 25 - Tekstslide

Slide 26 - Tekstslide

Slide 27 - Tekstslide

Slide 28 - Tekstslide

Slide 29 - Tekstslide

Slide 30 - Tekstslide

Slide 31 - Tekstslide

Slide 32 - Tekstslide

Slide 33 - Tekstslide

Slide 34 - Tekstslide