Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Lesson 15 - Network Security

Engagement Activity

In pairs/tables, discuss all of the key words you associate with network security and then write them down on your own worksheet

(5 mins)

Objectives

Lesson Objectives

To understand what is meant by cyber security

To understand why security is of importance

To explore the main threats to cyber security

Question

What is network/cyber security?

Theory

Cyber Security

A set of measures taken to protect a computer from harm to its data and software.

It also includes the protection of computer networks from unauthorised access.

Why is it important?

Exam Techniques

Cyber security could be included as a longer response question in the paper so to help you remember.....

Task

In EXACTLY 100 words sum up:

What cyber security is

Why it is important

What motivates us to protect our data (Hint: include legislation)

Print, hole punch and file in folder

Threats

Now we understand what Cyber security is, we will look in more detail at some of the things that are a threat to security

Malware

Malicious Software - this is a topic in its own but:

Viruses

Worms

Spyware

Ransomware

Trojan

Social Engineering

You can create a network with very high security, but people are always a weak link!

An attack where users are tricked/bribed/threatened is called a social attack

This type of social attack is important and serious enough to be given it's own name!

Phishing involves sending out emails or making phone calls pretending to be a legitimate authority such as a bank manager

1. Pretend there is an urgent problem

2. Provide a way to stop this taking place

3. The real details you enter are provided to the phisher

Brute Force Attacks

The most basic way of breaking a password

A program tries every combination of letter/number until the correct one is found - OFTEN USING A DICTIONARY

Easily prevented by setting a limit upon how many guesses can be input before the account is locked or using two-step authentication

DOS/DDOS

Flooding a server with bogus requests in order to overwhelm it until it crashes

Can be achieved using hundreds or thousands of infected machines known as 'bots'. This is then called a Distributed Denial Of Service attack

Man in the middle

Also called data interception

A server or router sits in between communications and copies data, before sending it on as normal

SQL Injection

Poor Policies

Having weak policies puts you at risk

Ensure staff are trained

Password policies

Encryption policies

Policies regarding USB sticks etc

Task

Task

Shared > Computing - ICT > Gcse (9-1) > Network Security > lesson 1 > Main

Use the mini web to help!

No copy and paste jobs, no excuses - You aren't 'putting it into my own words after'

Review of learning

Lesson Review

3 different threats to network security

The name of an attack that causes a server to be overwhelmed with requests

Learn more about creating dynamic, engaging presentations with Prezi