Networking lesson 6

Networking lesson 6
1 / 14
volgende
Slide 1: Tekstslide
ComputingLower Secondary (Key Stage 3)

In deze les zitten 14 slides, met interactieve quizzen en tekstslides.

time-iconLesduur is: 50 min

Onderdelen in deze les

Networking lesson 6

Slide 1 - Tekstslide

What personal information are you handing over in these images?

Slide 2 - Woordweb

Lesson 6: Computer networks 
Conquer: Recognize how human errors pose security risks to data.

Aspire: Implement strategies to minimize the risk of data being compromised through human error.    


Slide 3 - Tekstslide

Social engineering
There are lots of ways to try and keep data safe and secure.

However, Human error arguably creates the largest risk of the data being compromised.



 

Slide 4 - Tekstslide

Social engineering
Social engineering is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.

Slide 5 - Tekstslide

Phishing
A phishing attack is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

Slide 6 - Tekstslide

Can you list any errors found in this email, one has been done for you!

Slide 7 - Open vraag

Phishing: Key indicators of a phishing email 
  • Unexpected email with a request for information
  • Message content contains spelling errors
  • Suspicious links in email
  • Generic emails that don't know you by name or contain any personal information that you would expect the sender to know

Slide 8 - Tekstslide

Phishing attacks
Phishing attacks are not always via email. 

Watch the video below and on the next slide, explain what scam you think happened. 

Slide 9 - Tekstslide

What was the scam?

Slide 10 - Woordweb

Blagging 
Blagging is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.

Slide 11 - Tekstslide

State any parts of the email that make it suspicious.

Slide 12 - Open vraag

The email shown may be what type of attack?

A
Shouldering
B
Phishing
C
Blagging
D
Hacking

Slide 13 - Quizvraag

ISL lesson task
Create a poster warning users about what to watch out for with phishing and blagging emails. 



Slide 14 - Tekstslide