Networking lesson 6

Networking lesson 6
1 / 14
suivant
Slide 1: Diapositive
ComputingLower Secondary (Key Stage 3)

Cette leçon contient 14 diapositives, avec quiz interactifs et diapositives de texte.

time-iconLa durée de la leçon est: 50 min

Éléments de cette leçon

Networking lesson 6

Slide 1 - Diapositive

What personal information are you handing over in these images?

Slide 2 - Carte mentale

Lesson 6: Computer networks 
Conquer: Recognize how human errors pose security risks to data.

Aspire: Implement strategies to minimize the risk of data being compromised through human error.    


Slide 3 - Diapositive

Social engineering
There are lots of ways to try and keep data safe and secure.

However, Human error arguably creates the largest risk of the data being compromised.



 

Slide 4 - Diapositive

Social engineering
Social engineering is a set of methods used by cybercriminals to deceive individuals into handing over information that they can use for fraudulent purposes.

Slide 5 - Diapositive

Phishing
A phishing attack is an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.

Slide 6 - Diapositive

Can you list any errors found in this email, one has been done for you!

Slide 7 - Question ouverte

Phishing: Key indicators of a phishing email 
  • Unexpected email with a request for information
  • Message content contains spelling errors
  • Suspicious links in email
  • Generic emails that don't know you by name or contain any personal information that you would expect the sender to know

Slide 8 - Diapositive

Phishing attacks
Phishing attacks are not always via email. 

Watch the video below and on the next slide, explain what scam you think happened. 

Slide 9 - Diapositive

What was the scam?

Slide 10 - Carte mentale

Blagging 
Blagging is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.

Slide 11 - Diapositive

State any parts of the email that make it suspicious.

Slide 12 - Question ouverte

The email shown may be what type of attack?

A
Shouldering
B
Phishing
C
Blagging
D
Hacking

Slide 13 - Quiz

ISL lesson task
Create a poster warning users about what to watch out for with phishing and blagging emails. 



Slide 14 - Diapositive