Network Threats

Unit 4.1 Network Threats
1 / 34
suivant
Slide 1: Diapositive
ComputingUpper Secondary (Key Stage 4)GCSE

Cette leçon contient 34 diapositives, avec quiz interactifs et diapositives de texte.

time-iconLa durée de la leçon est: 50 min

Éléments de cette leçon

Unit 4.1 Network Threats

Slide 1 - Diapositive

1. Why do we comment our code?
2. Convert 1010 from binary to denary.
3. Explain the programming construct selection.
4. What Python function would we use for selection?

Slide 2 - Question ouverte

Lesson Objectives

Conquer: Understand forms of attack and threats posed to a network.

Aspire: Evaluate methods to defend against these attacks.​



Slide 3 - Diapositive

Malware
Malware comes from two words:​

  • Malicious – to cause an act of harm.​
  • Software – programs that run on the computer.​

Malware – software designed to damage, disrupt, or gain access to a computer system.​






Slide 4 - Diapositive

Malware - Viruses
Computer viruses infect computers​. 
  • They replicate their code in other programs​.
  • They infect other computers​ if sent to them.
  • They harm the computer by deleting,​ corrupting, or modifying files​.



Slide 5 - Diapositive

Malware - Worms
Computer viruses infect computers​. 
  • They replicate their code without needing other programs​ to attach to.

  • They might not harm the computer, but they slow everything down as they replicate using up more of the computer/network resources​.



Slide 6 - Diapositive

Malware - Trojan Horse
There is ​a story that during the Trojan War, the Greeks made a ​wooden horse and hid men inside.​

Computer Trojans are similar:​
  • They have a program, game or cracked​ file which
    is something the user wants​.
  • They have negative program code which​ causes
    damage, takes control, or provides​ access to the
    computer​.



Slide 7 - Diapositive

Malware - Ransomware
Ransomware is software which:​

  • Holds a computer hostage by locking or ​encrypting access to it​.
  • If the data is encrypted, not even​ a cyber security professional will ​be able to recover the data unless ​backups are available​.
  • Once a ransom is paid to the ​attacker, access is restored (sometimes)​.



Slide 8 - Diapositive

Why do you think the ransomware attacking key infrastructure is important?

Slide 9 - Question ouverte

Tyler goes to a website that says that it will supply cracked software that doesn’t need a licence. After installing the software, the user is pleased as it works as expected. They notice later that many adverts display on their computer.
A
Virus
B
Worm
C
Trojan
D
Ransomware

Slide 10 - Quiz

Leila clicked on a file in an email attachment. Today, when she turned on her computer it said that all her files are now encrypted. She has been given 24 hours to pay one bitcoin to unencrypt the files.
A
Virus
B
Worm
C
Trojan
D
Ransomware

Slide 11 - Quiz

Richard has downloaded a file from the Internet and run it. After a short while he has noticed that many of the files on his computer have been deleted or corrupted.
A
Virus
B
Worm
C
Trojan
D
Ransomware

Slide 12 - Quiz

A program has been written that targets computers on the Internet. It automatically replicates itself, and whilst it doesn’t harm any individual computers, it does slow down the network.
A
Virus
B
Worm
C
Trojan
D
Ransomware

Slide 13 - Quiz

1. What two words are combined make the term malware?
2. Name four types of malware.
3. How does ransomware work?

Slide 14 - Question ouverte

Exploiting Vulnerabilities
  1. Unpatched software 
  2. Out-of-date anti-malware 
  3. Social Engineering - Asking people for the information.

Slide 15 - Diapositive

Phishing
Phishing is a type of social engineering technique.

Emails, texts or phone calls are sent to users commonly pretending to be from a bank or website. 

Slide 16 - Diapositive

Phishing
Things to look out for:
  • The ‘From’ email address may be forged
  • These messages will try to get personal information such as:
  • Usernames
  • Passwords
  • Credit cards details
  • Other personal information

Slide 17 - Diapositive

Phishing

Slide 18 - Diapositive

Slide 19 - Diapositive

Slide 20 - Diapositive

Slide 21 - Diapositive

Slide 22 - Diapositive

Slide 23 - Diapositive

Slide 24 - Diapositive

Slide 25 - Diapositive

Slide 26 - Diapositive

Slide 27 - Diapositive

Slide 28 - Diapositive

Slide 29 - Diapositive

Slide 30 - Diapositive

Slide 31 - Diapositive

Slide 32 - Diapositive

Slide 33 - Diapositive

Slide 34 - Diapositive