Qu'est-ce que LessonUp
Rechercher
Canaux
Connectez-vous
S'inscrire
‹
Revenir à la recherche
Veilig werken 2.6
Data Security & Privacy
week 2.6
1 / 15
suivant
Slide 1:
Diapositive
Engels
MBO
Studiejaar 1
Cette leçon contient
15 diapositives
, avec
quiz interactifs
,
diapositives de texte
et
1 vidéo
.
La durée de la leçon est:
90 min
Commencer la leçon
Partager
Imprimer la leçon
Éléments de cette leçon
Data Security & Privacy
week 2.6
Slide 1 - Diapositive
Today
Warming-up:
quiz
Listening:
video
Reading/listening:
research into social engineering
Missed assignments?
Writing
: 3 pieces of advice to avoid Vishing
Slide 2 - Diapositive
Warming-up
Quiz
Slide 3 - Diapositive
Which of the following things can cause data to become corrupt when it's broken?
A
scanner
B
hard drive
C
printer
Slide 4 - Quiz
Which of the following is unlikely to damage or delete data?
A
system crash
B
archiving
C
a virus
Slide 5 - Quiz
Which would be the best method of backing up your data?
A
Printing out paper copies and filing them away
B
Keep a second copy of the data on your hard disk
C
Make a copy on removable storage device, e.g. CD, DVD, hard-drive
Slide 6 - Quiz
In order to control access to secure data, a system of what should be used?
A
Passwords
B
Anti-virus software
C
Multi-user Operating System
Slide 7 - Quiz
Which of the following is NOT a physical precaution to protect digital data?
A
Locks on doors
B
Security guards
C
Passwords
Slide 8 - Quiz
What indicates a secure connection between your computer and a trusted website?
A
html
B
https
C
xhtml
Slide 9 - Quiz
3
Slide 10 - Vidéo
00:21
Social engineering means...
A
Using code to hack someone, to get access to their data
B
Deceiving someone to get access to their data
C
Leaking private information on purpose
Slide 11 - Quiz
00:32
There's a difference between ''vishing''(shown in the video) and ''phishing''
What are examples of ''phishing''?
A
Alert from your bank, saying there's a problem with your account, asking for your PIN.
B
Receiving an email with a link to a fake website. Click on it and it will collect your data.
C
Someone showing up at your door, manipulating you into giving them your information.
Slide 12 - Quiz
02:07
What did Jess do to get access to the account?
Slide 13 - Carte mentale
Research: Writing
Find at least 3
articles/videos/podcasts about social engineering.
Keep
the links to the articles/videos/podcasts you found to use for this week's assignment.
Inleveropdracht (week 2.6):
3 pieces of advice to avoid Vishing / Social Engineering
Cite your sources (links you used)
Slide 14 - Diapositive
Writing (inleveropdracht)
3 pieces of advice to avoid Vishing / Social Engineering
Email / letter / manual
Cite your sources (links you used)
Hand in: Teams week 2.6
Slide 15 - Diapositive
Plus de leçons comme celle-ci
critical essay- sources
Novembre 2023
- Leçon avec
14 diapositives
Engels
Middelbare school
vwo
Leerjaar 5
Securing Your Digital World: Protecting Data and Devices Online
Janvier 2024
- Leçon avec
15 diapositives
Digitale Veiligheid in de Klas
Juillet 2024
- Leçon avec
20 diapositives
Recap Present Perfect vs Past Simple + Modals
Juin 2022
- Leçon avec
29 diapositives
Engels
Middelbare school
vwo
Leerjaar 2
Essay Writing 445
Août 2022
- Leçon avec
27 diapositives
Engels
Middelbare school
vwo
Leerjaar 5
Networking lesson 6
Octobre 2023
- Leçon avec
14 diapositives
Computing
Lower Secondary (Key Stage 3)
Menu Engineering: The Complete Guide
Août 2024
- Leçon avec
18 diapositives
Voeding
MBO
Studiejaar 2
Ted talk Ten ways to have a better conversation
Octobre 2024
- Leçon avec
10 diapositives
Engels
Middelbare school
mavo, havo, vwo