Networking lesson 6

Networking lesson 6
1 / 14
next
Slide 1: Slide
ComputingLower Secondary (Key Stage 3)

This lesson contains 14 slides, with interactive quizzes and text slides.

time-iconLesson duration is: 50 min

Items in this lesson

Networking lesson 6

Slide 1 - Slide

What personal information are you handing over in these images?

Slide 2 - Mind map

Lesson 6: Computer networks 
Conquer: Recognize how human errors pose security risks to data.

Aspire: Implement strategies to minimize the risk of data being compromised through human error.    


Slide 3 - Slide

Social engineering
There are lots of ways to try and keep data safe and secure.

However, Human error arguably creates the largest risk of the data being compromised.



 

Slide 4 - Slide

Social engineering
Social engineering is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.

Slide 5 - Slide

Phishing
A phishing attack is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

Slide 6 - Slide

Can you list any errors found in this email, one has been done for you!

Slide 7 - Open question

Phishing: Key indicators of a phishing email 
  • Unexpected email with a request for information
  • Message content contains spelling errors
  • Suspicious links in email
  • Generic emails that don't know you by name or contain any personal information that you would expect the sender to know

Slide 8 - Slide

Phishing attacks
Phishing attacks are not always via email. 

Watch the video below and on the next slide, explain what scam you think happened. 

Slide 9 - Slide

What was the scam?

Slide 10 - Mind map

Blagging 
Blagging is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.

Slide 11 - Slide

State any parts of the email that make it suspicious.

Slide 12 - Open question

The email shown may be what type of attack?

A
Shouldering
B
Phishing
C
Blagging
D
Hacking

Slide 13 - Quiz

ISL lesson task
Create a poster warning users about what to watch out for with phishing and blagging emails. 



Slide 14 - Slide