Lesson 1

Cyber Security Threats
▶ By the end of this lesson, learners will understand and be able to identify:
  1. Internal threats
  2. External Threats

1 / 18
next
Slide 1: Slide
ItFurther Education (Key Stage 5)

This lesson contains 18 slides, with interactive quizzes and text slide.

time-iconLesson duration is: 18 min

Items in this lesson

Cyber Security Threats
▶ By the end of this lesson, learners will understand and be able to identify:
  1. Internal threats
  2. External Threats

Slide 1 - Slide

What is a Threat with regards to organisational security systems?

Slide 2 - Open question

What is a Threat with regards to organisational security systems?

Slide 3 - Open question

What is an internal and external threat?

Slide 4 - Open question

What is an internal and external threat?

Slide 5 - Open question

What internal threats can any I.T system
face?

Slide 6 - Open question

What external threats can any I.T system
face?

Slide 7 - Open question


In any Organisation what do you think is the biggest threat to their IT infrastructure?

Slide 8 - Mind map

What is a threat in cybersecurity?
A
A technique used to protect data
B
Any potential danger that exploits a vulnerability
C
A software program designed to perform malicious actions
D
A firewall protecting against unauthorized access

Slide 9 - Quiz

Which of the following is an example of an internal threat?
A
A hacker exploiting a system vulnerability
B
An employee accidentally leaking confidential data
C
Malware delivered through a phishing email
D
A ransomware attack on company servers

Slide 10 - Quiz

Which of the following is NOT an external threat?
A
Malware
B
Phishing attack
C
Unauthorized employee access
D
Distributed Denial of Service (DDoS) attack

Slide 11 - Quiz

What is the main difference between internal and external threats?
A
Internal threats come from inside the organization, external threats come from outside
B
External threats are always more dangerous
C
Internal threats only involve data theft
D
External threats cannot be prevented

Slide 12 - Quiz

Which of the following is an example of a social engineering threat?
A
Spyware
B
Ransomware
C
Phishing
D
Denial of Service (DoS) attack

Slide 13 - Quiz

Which of these is a type of internal cyber threat?
A
Hacking from a rival company
B
Disgruntled employee sabotaging the system
C
Malware from an external source
D
Spyware installed by a cybercriminal

Slide 14 - Quiz

What is the goal of ransomware?
A
To track user behaviour
B
To lock users out of their systems until a ransom is paid
C
To steal user passwords
D
To overload a server and cause it to crash

Slide 15 - Quiz

What is the most common motivation behind external cyber threats?
A
To improve system performance
B
Financial gain
C
Sharing valuable data with employees
D
Increasing employee productivity

Slide 16 - Quiz

Which of the following best describes hacking?
A
Gaining unauthorized access to data or systems
B
Creating a secure network
C
Monitoring employee performance
D
Using software to prevent data breaches

Slide 17 - Quiz

Which of these is a potential impact of a cyber attack?
A
Improved system functionality
B
Increased employee productivity
C
Operational loss and financial damage
D
Better data security practices

Slide 18 - Quiz