This lesson contains 31 slides, with interactive quizzes and text slides.
Lesson duration is: 50 min
Items in this lesson
Slide 1 - Slide
Lesson Objectives
Conquer: Understand forms of attack and threats posed to a network.
Aspire: Evaluate methods to defend against these attacks.
Slide 2 - Slide
Slide 3 - Slide
Slide 4 - Slide
Slide 5 - Slide
Slide 6 - Slide
Slide 7 - Slide
Slide 8 - Slide
Slide 9 - Slide
Slide 10 - Slide
Slide 11 - Slide
Slide 12 - Slide
Slide 13 - Slide
Slide 14 - Slide
Slide 15 - Slide
Slide 16 - Slide
Slide 17 - Slide
Slide 18 - Slide
Slide 19 - Slide
Slide 20 - Slide
Slide 21 - Slide
Slide 22 - Slide
Slide 23 - Slide
Slide 24 - Slide
Why do you think the ransomware attacking key infrastructure is important?
Slide 25 - Open question
Tyler goes to a website that says that it will supply cracked software that doesn’t need a licence. After installing the software, the user is pleased as it works as expected. They notice later that many adverts display on their computer.
A
Virus
B
Worm
C
Trojan
D
Ransomware
Slide 26 - Quiz
Leila clicked on a file in an email attachment. Today, when she turned on her computer it said that all her files are now encrypted. She has been given 24 hours to pay one bitcoin to unencrypt the files.
A
Virus
B
Worm
C
Trojan
D
Ransomware
Slide 27 - Quiz
Richard has downloaded a file from the Internet and run it. After a short while he has noticed that many of the files on his computer have been deleted or corrupted.
A
Virus
B
Worm
C
Trojan
D
Ransomware
Slide 28 - Quiz
A program has been written that targets computers on the Internet. It automatically replicates itself, and whilst it doesn’t harm any individual computers, it does slow down the network.
A
Virus
B
Worm
C
Trojan
D
Ransomware
Slide 29 - Quiz
1. What two words are combined make the term malware? 2. Name four types of malware. 3. How does ransomware work?