Network Threats

Unit 4.1 Network Threats
1 / 34
next
Slide 1: Slide
ComputingUpper Secondary (Key Stage 4)GCSE

This lesson contains 34 slides, with interactive quizzes and text slides.

time-iconLesson duration is: 50 min

Items in this lesson

Unit 4.1 Network Threats

Slide 1 - Slide

1. Why do we comment our code?
2. Convert 1010 from binary to denary.
3. Explain the programming construct selection.
4. What Python function would we use for selection?

Slide 2 - Open question

Lesson Objectives

Conquer: Understand forms of attack and threats posed to a network.

Aspire: Evaluate methods to defend against these attacks.​



Slide 3 - Slide

Malware
Malware comes from two words:​

  • Malicious – to cause an act of harm.​
  • Software – programs that run on the computer.​

Malware – software designed to damage, disrupt, or gain access to a computer system.​






Slide 4 - Slide

Malware - Viruses
Computer viruses infect computers​. 
  • They replicate their code in other programs​.
  • They infect other computers​ if sent to them.
  • They harm the computer by deleting,​ corrupting, or modifying files​.



Slide 5 - Slide

Malware - Worms
Computer viruses infect computers​. 
  • They replicate their code without needing other programs​ to attach to.

  • They might not harm the computer, but they slow everything down as they replicate using up more of the computer/network resources​.



Slide 6 - Slide

Malware - Trojan Horse
There is ​a story that during the Trojan War, the Greeks made a ​wooden horse and hid men inside.​

Computer Trojans are similar:​
  • They have a program, game or cracked​ file which
    is something the user wants​.
  • They have negative program code which​ causes
    damage, takes control, or provides​ access to the
    computer​.



Slide 7 - Slide

Malware - Ransomware
Ransomware is software which:​

  • Holds a computer hostage by locking or ​encrypting access to it​.
  • If the data is encrypted, not even​ a cyber security professional will ​be able to recover the data unless ​backups are available​.
  • Once a ransom is paid to the ​attacker, access is restored (sometimes)​.



Slide 8 - Slide

Why do you think the ransomware attacking key infrastructure is important?

Slide 9 - Open question

Tyler goes to a website that says that it will supply cracked software that doesn’t need a licence. After installing the software, the user is pleased as it works as expected. They notice later that many adverts display on their computer.
A
Virus
B
Worm
C
Trojan
D
Ransomware

Slide 10 - Quiz

Leila clicked on a file in an email attachment. Today, when she turned on her computer it said that all her files are now encrypted. She has been given 24 hours to pay one bitcoin to unencrypt the files.
A
Virus
B
Worm
C
Trojan
D
Ransomware

Slide 11 - Quiz

Richard has downloaded a file from the Internet and run it. After a short while he has noticed that many of the files on his computer have been deleted or corrupted.
A
Virus
B
Worm
C
Trojan
D
Ransomware

Slide 12 - Quiz

A program has been written that targets computers on the Internet. It automatically replicates itself, and whilst it doesn’t harm any individual computers, it does slow down the network.
A
Virus
B
Worm
C
Trojan
D
Ransomware

Slide 13 - Quiz

1. What two words are combined make the term malware?
2. Name four types of malware.
3. How does ransomware work?

Slide 14 - Open question

Exploiting Vulnerabilities
  1. Unpatched software 
  2. Out-of-date anti-malware 
  3. Social Engineering - Asking people for the information.

Slide 15 - Slide

Phishing
Phishing is a type of social engineering technique.

Emails, texts or phone calls are sent to users commonly pretending to be from a bank or website. 

Slide 16 - Slide

Phishing
Things to look out for:
  • The ‘From’ email address may be forged
  • These messages will try to get personal information such as:
  • Usernames
  • Passwords
  • Credit cards details
  • Other personal information

Slide 17 - Slide

Phishing

Slide 18 - Slide

Slide 19 - Slide

Slide 20 - Slide

Slide 21 - Slide

Slide 22 - Slide

Slide 23 - Slide

Slide 24 - Slide

Slide 25 - Slide

Slide 26 - Slide

Slide 27 - Slide

Slide 28 - Slide

Slide 29 - Slide

Slide 30 - Slide

Slide 31 - Slide

Slide 32 - Slide

Slide 33 - Slide

Slide 34 - Slide