Digital Literacy - Session 1 - Introduction to Online Safety, and Security

Digital Literacy

Introduction to Online Safety, and Security
1 / 28
next
Slide 1: Slide
ComputingUpper Secondary (Key Stage 4)BTEC

This lesson contains 28 slides, with interactive quizzes, text slides and 2 videos.

time-iconLesson duration is: 90 min

Items in this lesson

Digital Literacy

Introduction to Online Safety, and Security

Slide 1 - Slide

Aims for this Session

  • A.C 1.1- Identify online security risks.
  • A.C 1.2 - Implement best practices for responsible online behaviour.

Slide 2 - Slide

What are some online risks you've heard about?

Slide 3 - Mind map

What Is Cybersecurity?
Cybersecurity is the practice of protecting systems, networks, and programs from digital or cyber attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.

Slide 4 - Slide

What Is Malware?
Malware (short for “malicious software”) is a catch-all term for any type of malicious software designed to harm or exploit a computer or network. Typically once malware is on a computer or network it will start to infect files, explore the system, steal information possibly including passwords.

Slide 5 - Slide

What Makes Malware Malicious?
Impair device performance – Malware can cause computers to slow-down, decreasing their performance. Malware can also cause increases in internet activity and loss of disk space, depending on the malware.

Erase Data – Malware can corrupt files making them unusable. It can also delete files and in some instance send a copy of the file over the internet for other people to access.

Adversely affects computer controlled hardware - Malware can also impact the performance of the hardware through corrupting drivers and changing the settings on devices. For example, malware could overheat the CPU by controlling the fans.  

Slide 6 - Slide

Types of Malware
Ransomware

Encrypts files or devices blackmailing the target to pay a ransom in order for the information to be decrypted. 
A message is usually left by the hacker to let you know it has happened and what you need to do to sort it. This type of attack can occur against individuals or organisations. 

Slide 7 - Slide

Types of Malware
Ransomware

Encrypts files or devices blackmailing the target to pay a ransom in order for the information to be decrypted. 
A message is usually left by the hacker to let you know it has happened and what you need to do to sort it. This type of attack can occur against individuals or organisations. 
Spyware 

Gathers information from the device, computer or network by monitoring user activity or network traffic. The gathered information is then passed back to the attacker.

Slide 8 - Slide

Types of Malware
Ransomware

Encrypts files or devices blackmailing the target to pay a ransom in order for the information to be decrypted. 
A message is usually left by the hacker to let you know it has happened and what you need to do to sort it. This type of attack can occur against individuals or organisations. 
Spyware 

Gathers information from the device, computer or network by monitoring user activity or network traffic. The gathered information is then passed back to the attacker.
Viruses 

Self-replicating malicious code that can infect other programs and spread across systems. A viruses main aim is to disrupt systems, cause major operational issues, and result in data loss and leakage.

Slide 9 - Slide

Types of Malware
Ransomware

Encrypts files or devices blackmailing the target to pay a ransom in order for the information to be decrypted. 
A message is usually left by the hacker to let you know it has happened and what you need to do to sort it. This type of attack can occur against individuals or organisations. 
Spyware 

Gathers information from the device, computer or network by monitoring user activity or network traffic. The gathered information is then passed back to the attacker.
Viruses 

Self-replicating malicious code that can infect other programs and spread across systems. A viruses main aim is to disrupt systems, cause major operational issues, and result in data loss and leakage.
Trojan

Pretends to be legitimate software, tricking users into downloading it. 

Unlike other types of malware, trojans are not self-replicating, meaning that the user has to take action and actively click on the file for the malicious software, or payload, to execute.

Slide 10 - Slide

Other Types of Attacks
Worms

Stand-alone malicious programs that can self-replicate and spread to other systems. Like Trojan horses they can be downloaded in email attachments or attached to malicious links.

Slide 11 - Slide

Other Types of Attacks
Worms

Stand-alone malicious programs that can self-replicate and spread to other systems. Like Trojan horses they can be downloaded in email attachments or attached to malicious links.
Password Attack

Hackers can use software to 'guess' a password based on a list of most common passwords or combinations and attempts to access the system in this way.

Did you know the password 123456 is the most common password used by over 2 million people? It would take less than a second to crack this password. (NordPass, 2020)

Slide 12 - Slide

Other Types of Attacks
Worms

Stand-alone malicious programs that can self-replicate and spread to other systems. Like Trojan horses they can be downloaded in email attachments or attached to malicious links.
Password Attack

Hackers can use software to 'guess' a password based on a list of most common passwords or combinations and attempts to access the system in this way.

Did you know the password 123456 is the most common password used by over 2 million people? It would take less than a second to crack this password. (NordPass, 2020)
Phishing 

A type of social engineering attack. In a phishing attack hackers try to gain access by deceiving people, typically using spam emails, mass-mailing, etc. 
In a phishing attack the attacker contacts the target(s) by sending an email impersonating a company/person with the aim of the person divulging confidential information such as bank details, national insurance numbers which is useful for the hacker.

Slide 13 - Slide

Slide 14 - Video

Other Types of Attacks
Vishing 

 A special type of attack, where the hacker uses a phone to extract information/access from the victim and falls under social engineering attacks. 

Typically, the attacker can:
- Try to gain access to a system by impersonating the real user.
- Contact a person pretending to be from an organisation in persuade the victim to transfer money or provide confidential information.

Slide 15 - Slide

Slide 16 - Video

Other Types of Attacks
Vishing 

 A special type of attack, where the hacker uses a phone to extract information/access from the victim and falls under social engineering attacks. 

Typically, the attacker can:
- Try to gain access to a system by impersonating the real user.
- Contact a person pretending to be from an organisation in persuade the victim to transfer money or provide confidential information.

Keyloggers

By tracking a user’s keystrokes, hackers use keyloggers to capture valuable information like passwords and account numbers.

Slide 17 - Slide

Other Types of Attacks
Vishing 

 A special type of attack, where the hacker uses a phone to extract information/access from the victim and falls under social engineering attacks. 

Typically, the attacker can:
- Try to gain access to a system by impersonating the real user.
- Contact a person pretending to be from an organisation in persuade the victim to transfer money or provide confidential information.

Keyloggers

By tracking a user’s keystrokes, hackers use keyloggers to capture valuable information like passwords and account numbers.
Adware

This type of malware bombards your device with unwanted advertisements. Not only are the ads annoying, but they can also slow down or even crash your device.

Slide 18 - Slide

Do you know anyone or heard about people who have been hacked?

What happened?

Slide 19 - Mind map

Workbook Activity
Q1. Identify potential security risks associated with working online including accessing services.

Slide 20 - Slide

Strengthening Online Security 
Anyone can have their information stolen. An individual might download programs or data from compromised websites infected by viruses like worms or malware. This gives criminals unauthorized access to their devices, allowing them to steal data.

Slide 21 - Slide

To protect yourself:
  • Use secure passwords
  • Avoid using the same password for multiple accounts
  • Use Multi-factor authentication
  • Be cautious when sharing personal information
  • Close unused accounts
  • Keep systems and programs up to date
  • Monitor your accounts
  • Be wary of free Wi-Fi

Slide 22 - Slide

How To Create Secure Passwords
  • Use at least 8 to 12 characters.
  • Use a combination of letters, numbers, and symbols.
  • Use a combination of upper and lowercase letters.
  • Use a different password for each of your accounts.
  • Don't include any of your personal information like your birthday or address, as identity theft and data breaches can compromise such information. It’s also best not to include any information that can be accessed on social media like kids’ or pets’ names.
  • Use uncommon, unusual words - think three random words or your favourite song.
  • A password shouldn’t contain any consecutive letters or numbers (i.e. ABCD, 1234, etc.)

Slide 23 - Slide

Why Use 2 Factor or Multi Factor Authentication?
Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two (2SV) or more (MFA) verification factors to gain access to a resource such as an application or an online account.

It is based on one of three types of additional information:

Things you know (knowledge), such as a password or PIN.

Things you have (possession), such as a badge or smartphone.

Things you are (inherence), such as a biometric like fingerprints or voice recognition.


Slide 24 - Slide

Activity
On the next page, follow the link and complete:

Tower of Treasure
Reality River
Mindful Mountain

Save the Certificates to your OneDrive

Slide 25 - Slide

Slide 26 - Link

Workbook Activity
Q2. Demonstrate how to protect services from online risks and threats.

For this question, write a paragraph on what steps you will be taking to protect yourself from online risks and threats given what you have been learning about today.

Slide 27 - Slide

In this Session We Covered:

  • A.C 1.1 - Identify online security risks.
  • A.C 1.2 - Implement best practices for responsible online behaviour.

Slide 28 - Slide