What is LessonUp
Search
Channels
Log in
Register
‹
Return to search
Veilig werken 2.6
Data Security & Privacy
week 2.6
1 / 15
next
Slide 1:
Slide
Engels
MBO
Studiejaar 1
This lesson contains
15 slides
, with
interactive quizzes
,
text slides
and
1 video
.
Lesson duration is:
90 min
Start lesson
Save
Share
Print lesson
Items in this lesson
Data Security & Privacy
week 2.6
Slide 1 - Slide
Today
Warming-up:
quiz
Listening:
video
Reading/listening:
research into social engineering
Missed assignments?
Writing
: 3 pieces of advice to avoid Vishing
Slide 2 - Slide
Warming-up
Quiz
Slide 3 - Slide
Which of the following things can cause data to become corrupt when it's broken?
A
scanner
B
hard drive
C
printer
Slide 4 - Quiz
Which of the following is unlikely to damage or delete data?
A
system crash
B
archiving
C
a virus
Slide 5 - Quiz
Which would be the best method of backing up your data?
A
Printing out paper copies and filing them away
B
Keep a second copy of the data on your hard disk
C
Make a copy on removable storage device, e.g. CD, DVD, hard-drive
Slide 6 - Quiz
In order to control access to secure data, a system of what should be used?
A
Passwords
B
Anti-virus software
C
Multi-user Operating System
Slide 7 - Quiz
Which of the following is NOT a physical precaution to protect digital data?
A
Locks on doors
B
Security guards
C
Passwords
Slide 8 - Quiz
What indicates a secure connection between your computer and a trusted website?
A
html
B
https
C
xhtml
Slide 9 - Quiz
3
Slide 10 - Video
00:21
Social engineering means...
A
Using code to hack someone, to get access to their data
B
Deceiving someone to get access to their data
C
Leaking private information on purpose
Slide 11 - Quiz
00:32
There's a difference between ''vishing''(shown in the video) and ''phishing''
What are examples of ''phishing''?
A
Alert from your bank, saying there's a problem with your account, asking for your PIN.
B
Receiving an email with a link to a fake website. Click on it and it will collect your data.
C
Someone showing up at your door, manipulating you into giving them your information.
Slide 12 - Quiz
02:07
What did Jess do to get access to the account?
Slide 13 - Mind map
Research: Writing
Find at least 3
articles/videos/podcasts about social engineering.
Keep
the links to the articles/videos/podcasts you found to use for this week's assignment.
Inleveropdracht (week 2.6):
3 pieces of advice to avoid Vishing / Social Engineering
Cite your sources (links you used)
Slide 14 - Slide
Writing (inleveropdracht)
3 pieces of advice to avoid Vishing / Social Engineering
Email / letter / manual
Cite your sources (links you used)
Hand in: Teams week 2.6
Slide 15 - Slide
More lessons like this
critical essay- sources
November 2023
- Lesson with
14 slides
Engels
Middelbare school
vwo
Leerjaar 5
Securing Your Digital World: Protecting Data and Devices Online
January 2024
- Lesson with
15 slides
Digitale Veiligheid in de Klas
July 2024
- Lesson with
20 slides
Recap Present Perfect vs Past Simple + Modals
June 2022
- Lesson with
29 slides
Engels
Middelbare school
vwo
Leerjaar 2
Essay Writing 445
August 2022
- Lesson with
27 slides
Engels
Middelbare school
vwo
Leerjaar 5
Networking lesson 6
October 2023
- Lesson with
14 slides
Computing
Lower Secondary (Key Stage 3)
Menu Engineering: The Complete Guide
August 2024
- Lesson with
18 slides
Voeding
MBO
Studiejaar 2
Ted talk Ten ways to have a better conversation
October 2024
- Lesson with
10 slides
Engels
Middelbare school
mavo, havo, vwo