Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading content…
Loading…
Transcript

5.3 - Threats

Revise, Recap, Review

3 Personal attributes

2 ethical issues

1 explanation of the hexadecimal number system

Objectives

Lesson Objectives

To understand the different threats to computer systems

To explore different categories of malware and what they do

Threats

IT systems face many threats

Some threats come with malicious intent, others are a result of accidents, failures or user error.

What kinds of things threaten our IT systems?

Theory

http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Phishing

The act of misleading people into parting with confidential data.

Usernames and Passwords

Financial information

Pharming

Manipulating vulnerabilities in DNS or installing software to re-direct a genuine request for a web page to another, fake site.

Hacking

"Gaining unauthorised access to a system."

Internal threats as well as external!

- Includes looking at files you don't normally have permission to view

- modifying or deleting files without permission

Interception/Eavesdropping

Interception is when data packets are intercepted by a third party, copied, edited or re-directed to a new location

Eavesdropping is a form of interception, but refers to listening in to traffic not intended for the reader such as an email or IM.

Data Theft

Removing copies of files/data from a system

Not always hacking - Can be performed by legitimate users of the network

Social Engineering

The manipulation of individuals to extract sensitive information

It could be someone calling and asking for username and password to check your computer for viruses

Task

Create a threat flashcard quiz.

Write the definition on one side and the category on the other.

Use these to test each others knowledge on this area

Task

Malware

What is Malware?

More theory

"Software which is specifically designed to disrupt, damage, or gain unauthorised access to a computer system."

Misconceptions

The term 'virus' has been incorrectly used as a blanket term for malware

There are many different types of malware that we will explore in this lesson.

Virus

Malicious code designed to spread from host to host

Needs to be attached to a host file or document and executed by the user or will remain dormant

Anti-virus software needs to be kept up to date as new code is written and released every single day

Worm

Different to a virus in the sense that it is a stand alone program - It doesn't need a host to spread

Doesn't necessarily change files system, but replicate themselves over and over to disable the system.

Trojan horse

A piece of code that manifests itself as serving a legitimate purpose, but contains malicious code to delete, edit or take down a system

Known to create a 'back door' into your computer allowing hackers to access your data

Adware

Particularly annoying!

Scary ones

Spyware - Software designed to spy on and record your activities, such as a key logger or screen shot grabber

Ransomware - malware that encrypts your files and asks for money in order to decrypt them. Usually a set period of time before files are deleted

Scare ware - Threatens the user with a false claim in the hope that they will pay a fee.

Construct an answer!

Use the worksheet to create an answer to the question using all of the key terms

Learn more about creating dynamic, engaging presentations with Prezi