Search Header Logo
CS Lesson 4

CS Lesson 4

Assessment

Presentation

Computers

6th - 8th Grade

Practice Problem

Medium

Created by

Carissa Mulford

Used 71+ times

FREE Resource

43 Slides • 10 Questions

1

media

2

media

3

Poll

Where are you on a scale of 1-4? Choose the response that best fits where you are currently.

1- I am unsure of what malware is, but I know how to make a strong password

2- I have heard of malware threats but would not be able to identify these terms yet

3- I recognize types of malware, cyber crime, and ways to prevent cyber crime and can show my friends ways to avoid cyber issues

4- I can discuss and distinguish the different types of malware, ways to prevent cyber crime and protect my information and devices through selecting appropriate antivirus software

4

In 2019, an official of the U.S. Department of Homeland Security (DHS) called the shortage of cybersecurity talent a national security risk.”

“At $6 trillion in 2021, cybercrime would rank behind only the gross domestic products (GDPs) of the United States and China. The amount lost to cybercrime is projected to swell to $10.5 trillion by 2025.”

“The U.S. Bureau of Labor Statistics (BLS) lists information security analyst as one of the 20 fastest-growing professions, projected to add 33% more jobs between 2020 and 2030, compared with an 8% average for all occupations.”

Cyber Crime

5

7

8

Multiple Choice

Malware is used to describe all types of bad software. Malware is a combination of what two words?

1

Magnificent and software

2

Malicious and software

3

Marketing and software

4

Normal and adware

9

media

10

media

11

media

12

13

14

media

15

​Password Reuse

According to LastPass, 59% of people reuse the same passwords across multiple sites.

Adversaries take big password dumps and attempt to use your password/username from the breached site on other platforms. This is called credential stuffing. It is important that you use different passwords for each site you use.

16

media

17

media

18

media

19

media
media
media

software that shows computer users unwanted advertisements (typically pop-ups) or redirects them to websites with advertisements.

Adware

collects personal information, such as browsing history, for third-party use.

Spyware

​typically infiltrates via email, luring a user to click on an attachment or visit a website that infects their computer with malicious code that locks valuable digital files. Perpetrators then demand a ransom for the release of the information.

Ransomware​

20

media

21

Multiple Choice

Which option below contains a key word or words used to describe a primary characteristic of a Trojan horse?

1

fast execution

2

disguised

3

open source

4

obvious display

22

media

23

Viruses require a host file or program and need intervention from a computer user to spread or replicate.

Worms can replicate themselves.

Virus vs Worm

media

24

Multiple Choice

_____ is a type of malware that may cause pop-up advertisements to appear outside the web browser.

1

adware

2

spyware

3

trojan virus

4

anti-malware software

25

Multiple Choice

What type of malware spreads over a network and infects files, often without human assistance?

1

Virus

2

Worm

3

Trojan horse

4

Rootkit

26

media

27

media

How does malware get on our devices?

28

media

29

media

30

media

31

media
media

method used by cyber criminals to obtain confidential information using emails or texts, commonly for the purpose of perpetrating identity theft. A phisher tricks targets into providing personal information such as account passwords and social security numbers.

Phishing

are disguised as normal files in order to trick users into downloading them so that a hacker can gain access to a computer.

Trojan Viruses

​Malware through trickery

32

media

33

media

34

media

35

media

36

37

media

38

media

39

Drag and Drop

Social engineering plays on people’s emotions, such as ​ ​ ​
​ and ​ natural ​ curiosity. 2. Joe found a USB drive labeled “Confidential” on the floor at his school. When he plugged it into his laptop, his antivirus warned him that the USB was infected with malware. What happened to Joe is an example of ​
3. Cybercriminals often use social engineering to install ​
on their victim’s device. 4. Pretexting is a tactic that relies on the criminal gaining the victim’s ​
5. Mariah receives a text from her bank that her account has been hacked. The text instructs her to click a link to verify her account information. This is an example of ​
Drag these tiles and drop them in the correct blank above
fear
baiting
malware
trust
phishing
ransomware
software
passwords
USB

40

41

media

42

media

43

media

44

media

45

46

47

48

media

49

50

Multiple Choice

Which of the following makes a virus different from a worm?

1

A worm requires human intervention to spread.

2

A virus requires human intervention to spread.

3

A virus is in computer code, and a worm is on web pages.

4

A worm is in computer code, and a virus is on web pages.

51

Multiple Choice

This type of software collects information about you without your knowledge and/or consent.

1

Spyware

2

Adware

3

Malware

4

Fraudware

52

Multiple Choice

What type of malware misleads users of its true intent?

1

Virus

2

Worm

3

Trojan horse

4

Rootkit

53

Multiple Choice

In data classification, your name, address, date of birth, and email are all examples of what?

1

Protected health information (PHI)

2

Protected identifiable data (PID)

3

. Personally identifiable information (PII)

4

Personally linked user information (PLUF)

media

Show answer

Auto Play

Slide 1 / 53

SLIDE