Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Revise, Recap, Review
3 Personal attributes
2 ethical issues
1 explanation of the hexadecimal number system
To understand the different threats to computer systems
To explore different categories of malware and what they do
Threats
IT systems face many threats
Some threats come with malicious intent, others are a result of accidents, failures or user error.
What kinds of things threaten our IT systems?
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
The act of misleading people into parting with confidential data.
Usernames and Passwords
Financial information
Manipulating vulnerabilities in DNS or installing software to re-direct a genuine request for a web page to another, fake site.
"Gaining unauthorised access to a system."
Internal threats as well as external!
- Includes looking at files you don't normally have permission to view
- modifying or deleting files without permission
Interception is when data packets are intercepted by a third party, copied, edited or re-directed to a new location
Eavesdropping is a form of interception, but refers to listening in to traffic not intended for the reader such as an email or IM.
Removing copies of files/data from a system
Not always hacking - Can be performed by legitimate users of the network
The manipulation of individuals to extract sensitive information
It could be someone calling and asking for username and password to check your computer for viruses
Task
Create a threat flashcard quiz.
Write the definition on one side and the category on the other.
Use these to test each others knowledge on this area
Malware
What is Malware?
"Software which is specifically designed to disrupt, damage, or gain unauthorised access to a computer system."
The term 'virus' has been incorrectly used as a blanket term for malware
There are many different types of malware that we will explore in this lesson.
Malicious code designed to spread from host to host
Needs to be attached to a host file or document and executed by the user or will remain dormant
Anti-virus software needs to be kept up to date as new code is written and released every single day
Different to a virus in the sense that it is a stand alone program - It doesn't need a host to spread
Doesn't necessarily change files system, but replicate themselves over and over to disable the system.
A piece of code that manifests itself as serving a legitimate purpose, but contains malicious code to delete, edit or take down a system
Known to create a 'back door' into your computer allowing hackers to access your data
Particularly annoying!
Spyware - Software designed to spy on and record your activities, such as a key logger or screen shot grabber
Ransomware - malware that encrypts your files and asks for money in order to decrypt them. Usually a set period of time before files are deleted
Scare ware - Threatens the user with a false claim in the hope that they will pay a fee.
Use the worksheet to create an answer to the question using all of the key terms