Veilig werken 2.6

Data Security & Privacy
week 2.6
1 / 15
suivant
Slide 1: Diapositive
EngelsMBOStudiejaar 1

Cette leçon contient 15 diapositives, avec quiz interactifs, diapositives de texte et 1 vidéo.

time-iconLa durée de la leçon est: 90 min

Éléments de cette leçon

Data Security & Privacy
week 2.6

Slide 1 - Diapositive

Today
  • Warming-up: quiz
  •  Listening: video
  • Reading/listening: research into social engineering
  • Missed assignments?
  • Writing: 3 pieces of advice to avoid Vishing

Slide 2 - Diapositive

Warming-up
Quiz

Slide 3 - Diapositive

Which of the following things can cause data to become corrupt when it's broken?
A
scanner
B
hard drive
C
printer

Slide 4 - Quiz

Which of the following is unlikely to damage or delete data?
A
system crash
B
archiving
C
a virus

Slide 5 - Quiz

Which would be the best method of backing up your data?
A
Printing out paper copies and filing them away
B
Keep a second copy of the data on your hard disk
C
Make a copy on removable storage device, e.g. CD, DVD, hard-drive

Slide 6 - Quiz

In order to control access to secure data, a system of what should be used?
A
Passwords
B
Anti-virus software
C
Multi-user Operating System

Slide 7 - Quiz

Which of the following is NOT a physical precaution to protect digital data?
A
Locks on doors
B
Security guards
C
Passwords

Slide 8 - Quiz

What indicates a secure connection between your computer and a trusted website?
A
html
B
https
C
xhtml

Slide 9 - Quiz

3

Slide 10 - Vidéo

00:21
Social engineering means...
A
Using code to hack someone, to get access to their data
B
Deceiving someone to get access to their data
C
Leaking private information on purpose

Slide 11 - Quiz

00:32
There's a difference between ''vishing''(shown in the video) and ''phishing''

What are examples of ''phishing''?
A
Alert from your bank, saying there's a problem with your account, asking for your PIN.
B
Receiving an email with a link to a fake website. Click on it and it will collect your data.
C
Someone showing up at your door, manipulating you into giving them your information.

Slide 12 - Quiz

02:07
What did Jess do to get access to the account?

Slide 13 - Carte mentale

Research: Writing
  • Find at least 3 articles/videos/podcasts about social engineering. 
  • Keep the links to the articles/videos/podcasts you found to use for this week's assignment.

Inleveropdracht (week 2.6):
  • 3 pieces of advice to avoid Vishing / Social Engineering
  • Cite your sources (links you used)

Slide 14 - Diapositive

Writing (inleveropdracht)
  • 3 pieces of advice to avoid Vishing / Social Engineering
  • Email / letter / manual 
  • Cite your sources (links you used)
  • Hand in: Teams week 2.6

 

Slide 15 - Diapositive