Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Software which is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.

Malware

The term 'virus' has been incorrectly used as a blanket term for malware

There are many different types of malware that we will explore in this lesson.

Pharming

Manipulating vulnerabilities in DNS or installing software to re-direct a genuine request for a web page to another, fake site.

What is malware?

Phishing

The act of misleading people into parting with confidential data.

  • Usernames and Passwords

  • Financial information

Virus

Malicious code designed to spread from host to host

Needs to be attached to a host file or document and executed by the user or will remain dormant

Anti-virus software needs to be kept up to date as new code is written and released every single day

Spyware - Software designed to spy on and record your activities, such as a key logger or screen shot grabber

Ransomware - malware that encrypts your files and asks for money in order to decrypt them. Usually a set period of time before files are deleted

Scare ware - Threatens the user with a false claim in the hope that they will pay a fee.

Adware

Hacking

"Gaining unauthorised access to a system."

Particularly annoying!

Worm

Internal threats as well as external!

- Includes looking at files you don't normally have permission to view

- modifying or deleting files without permission

Different to a virus in the sense that it is a stand alone program - It doesn't need a host to spread

Doesn't necessarily change files system, but replicate themselves over and over to disable the system.

Data breaches

Construct an answer

http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Use the worksheet to create an answer to the question using all of the key terms

Lesson Objectives

To understand the different threats to computer systems

To understand that malware does not just refer to viruses

Starter

3 Personal attributes

2 types of VDU

1 explanation of the hexadecimal number system

Social Engineering

The manipulation of individuals to extract sensitive information

Unit 1: 5.3 - Threats

Threats

IT systems face many threats

It could be someone calling and asking for username and password to check your computer for viruses

Some threats come with malicious intent, others are a result of accidents, failures or user error.

What kinds of things threaten our IT systems?

Task

Data Theft

Create a threat flashcard quiz.

Write the definition on one side and the category on the other.

Use these to test each others knowledge on this area

Removing copies of files/data from a system

Not always hacking - Can be performed by legitimate users of the network

Interception/eavesdropping

Trojan Horse

Interception is when data packets are intercepted by a third party, copied, edited or re-directed to a new location

A piece of code that manifests itself as serving a legitimate purpose, but contains malicious code to delete, edit or take down a system

Eavesdropping is a form of interception, but refers to listening in to traffic not intended for the reader such as an email or IM.

Known to create a 'back door' into your computer allowing hackers to access your data

Learn more about creating dynamic, engaging presentations with Prezi