Veilig werken 2.6

Data Security & Privacy
week 2.6
1 / 15
volgende
Slide 1: Tekstslide
EngelsMBOStudiejaar 1

In deze les zitten 15 slides, met interactieve quizzen, tekstslides en 1 video.

time-iconLesduur is: 90 min

Onderdelen in deze les

Data Security & Privacy
week 2.6

Slide 1 - Tekstslide

Today
  • Warming-up: quiz
  •  Listening: video
  • Reading/listening: research into social engineering
  • Missed assignments?
  • Writing: 3 pieces of advice to avoid Vishing

Slide 2 - Tekstslide

Warming-up
Quiz

Slide 3 - Tekstslide

Which of the following things can cause data to become corrupt when it's broken?
A
scanner
B
hard drive
C
printer

Slide 4 - Quizvraag

Which of the following is unlikely to damage or delete data?
A
system crash
B
archiving
C
a virus

Slide 5 - Quizvraag

Which would be the best method of backing up your data?
A
Printing out paper copies and filing them away
B
Keep a second copy of the data on your hard disk
C
Make a copy on removable storage device, e.g. CD, DVD, hard-drive

Slide 6 - Quizvraag

In order to control access to secure data, a system of what should be used?
A
Passwords
B
Anti-virus software
C
Multi-user Operating System

Slide 7 - Quizvraag

Which of the following is NOT a physical precaution to protect digital data?
A
Locks on doors
B
Security guards
C
Passwords

Slide 8 - Quizvraag

What indicates a secure connection between your computer and a trusted website?
A
html
B
https
C
xhtml

Slide 9 - Quizvraag

3

Slide 10 - Video

00:21
Social engineering means...
A
Using code to hack someone, to get access to their data
B
Deceiving someone to get access to their data
C
Leaking private information on purpose

Slide 11 - Quizvraag

00:32
There's a difference between ''vishing''(shown in the video) and ''phishing''

What are examples of ''phishing''?
A
Alert from your bank, saying there's a problem with your account, asking for your PIN.
B
Receiving an email with a link to a fake website. Click on it and it will collect your data.
C
Someone showing up at your door, manipulating you into giving them your information.

Slide 12 - Quizvraag

02:07
What did Jess do to get access to the account?

Slide 13 - Woordweb

Research: Writing
  • Find at least 3 articles/videos/podcasts about social engineering. 
  • Keep the links to the articles/videos/podcasts you found to use for this week's assignment.

Inleveropdracht (week 2.6):
  • 3 pieces of advice to avoid Vishing / Social Engineering
  • Cite your sources (links you used)

Slide 14 - Tekstslide

Writing (inleveropdracht)
  • 3 pieces of advice to avoid Vishing / Social Engineering
  • Email / letter / manual 
  • Cite your sources (links you used)
  • Hand in: Teams week 2.6

 

Slide 15 - Tekstslide