This lesson contains 34 slides, with interactive quizzes and text slides.
Lesson duration is: 50 min
Items in this lesson
Unit 4.1 Network Threats
Slide 1 - Slide
1. Why do we comment our code? 2. Convert 1010 from binary to denary. 3. Explain the programming construct selection. 4. What Python function would we use for selection?
Slide 2 - Open question
Lesson Objectives
Conquer: Understand forms of attack and threats posed to a network.
Aspire: Evaluate methods to defend against these attacks.
Slide 3 - Slide
Malware
Malware comes from two words:
Malicious – to cause an act of harm.
Software – programs that run on the computer.
Malware – software designed to damage, disrupt, or gain access to a computer system.
Slide 4 - Slide
Malware - Viruses
Computer viruses infect computers.
They replicate their code in other programs.
They infect other computers if sent to them.
They harm the computer by deleting, corrupting, or modifying files.
Slide 5 - Slide
Malware - Worms
Computer viruses infect computers.
They replicate their code without needing other programs to attach to.
They might not harm the computer, but they slow everything down as they replicate using up more of the computer/network resources.
Slide 6 - Slide
Malware - Trojan Horse
There is a story that during the Trojan War, the Greeks made a wooden horse and hid men inside.
Computer Trojans are similar:
They have a program, game or cracked file which is something the user wants.
They have negative program code which causes damage, takes control, or provides access to the computer.
Slide 7 - Slide
Malware - Ransomware
Ransomware is software which:
Holds a computer hostage by locking or encrypting access to it.
If the data is encrypted, not even a cyber security professional will be able to recover the data unless backups are available.
Once a ransom is paid to the attacker, access is restored (sometimes).
Why do you think the ransomware attacking key infrastructure is important?
Slide 9 - Open question
Tyler goes to a website that says that it will supply cracked software that doesn’t need a licence. After installing the software, the user is pleased as it works as expected. They notice later that many adverts display on their computer.
A
Virus
B
Worm
C
Trojan
D
Ransomware
Slide 10 - Quiz
Leila clicked on a file in an email attachment. Today, when she turned on her computer it said that all her files are now encrypted. She has been given 24 hours to pay one bitcoin to unencrypt the files.
A
Virus
B
Worm
C
Trojan
D
Ransomware
Slide 11 - Quiz
Richard has downloaded a file from the Internet and run it. After a short while he has noticed that many of the files on his computer have been deleted or corrupted.
A
Virus
B
Worm
C
Trojan
D
Ransomware
Slide 12 - Quiz
A program has been written that targets computers on the Internet. It automatically replicates itself, and whilst it doesn’t harm any individual computers, it does slow down the network.
A
Virus
B
Worm
C
Trojan
D
Ransomware
Slide 13 - Quiz
1. What two words are combined make the term malware? 2. Name four types of malware. 3. How does ransomware work?
Slide 14 - Open question
Exploiting Vulnerabilities
Unpatched software
Out-of-date anti-malware
Social Engineering - Asking people for the information.
Slide 15 - Slide
Phishing
Phishing is a type of social engineering technique.
Emails, texts or phone calls are sent to users commonly pretending to be from a bank or website.
Slide 16 - Slide
Phishing
Things to look out for:
The ‘From’ email address may be forged
These messages will try to getpersonal information such as: