
CS Lesson 4
Presentation
•
Computers
•
6th - 8th Grade
•
Practice Problem
•
Medium
Carissa Mulford
Used 72+ times
FREE Resource
43 Slides • 10 Questions
1
2
3
Poll
Where are you on a scale of 1-4? Choose the response that best fits where you are currently.
1- I am unsure of what malware is, but I know how to make a strong password
2- I have heard of malware threats but would not be able to identify these terms yet
3- I recognize types of malware, cyber crime, and ways to prevent cyber crime and can show my friends ways to avoid cyber issues
4- I can discuss and distinguish the different types of malware, ways to prevent cyber crime and protect my information and devices through selecting appropriate antivirus software
4
In 2019, an official of the U.S. Department of Homeland Security (DHS) called the shortage of cybersecurity talent a national security risk.”
“At $6 trillion in 2021, cybercrime would rank behind only the gross domestic products (GDPs) of the United States and China. The amount lost to cybercrime is projected to swell to $10.5 trillion by 2025.”
“The U.S. Bureau of Labor Statistics (BLS) lists information security analyst as one of the 20 fastest-growing professions, projected to add 33% more jobs between 2020 and 2030, compared with an 8% average for all occupations.”
Cyber Crime
5
7
8
Multiple Choice
Malware is used to describe all types of bad software. Malware is a combination of what two words?
Magnificent and software
Malicious and software
Marketing and software
Normal and adware
9
10
11
12
13
14
15
Password Reuse
According to LastPass, 59% of people reuse the same passwords across multiple sites.
Adversaries take big password dumps and attempt to use your password/username from the breached site on other platforms. This is called credential stuffing. It is important that you use different passwords for each site you use.
16
17
18
19
software that shows computer users unwanted advertisements (typically pop-ups) or redirects them to websites with advertisements.
Adware
collects personal information, such as browsing history, for third-party use.
Spyware
typically infiltrates via email, luring a user to click on an attachment or visit a website that infects their computer with malicious code that locks valuable digital files. Perpetrators then demand a ransom for the release of the information.
Ransomware
20
21
Multiple Choice
Which option below contains a key word or words used to describe a primary characteristic of a Trojan horse?
fast execution
disguised
open source
obvious display
22
23
Viruses require a host file or program and need intervention from a computer user to spread or replicate.
Worms can replicate themselves.
Virus vs Worm
24
Multiple Choice
_____ is a type of malware that may cause pop-up advertisements to appear outside the web browser.
adware
spyware
trojan virus
anti-malware software
25
Multiple Choice
What type of malware spreads over a network and infects files, often without human assistance?
Virus
Worm
Trojan horse
Rootkit
26
27
downloading free stuff like illegal downloads of popular movies, TV shows, or games
downloading content available on file-sharing sites
downloading files on removable storage like external hard drives or thumb drives
clicking links in fake security pop-ups sent to your computer by tech support scammers
clicking on ads placed by scammers on websites you visit
phishing emails that trick you into clicking on a link or opening an attachment
How does malware get on our devices?
28
29
30
31
method used by cyber criminals to obtain confidential information using emails or texts, commonly for the purpose of perpetrating identity theft. A phisher tricks targets into providing personal information such as account passwords and social security numbers.
Phishing
are disguised as normal files in order to trick users into downloading them so that a hacker can gain access to a computer.
Trojan Viruses
Malware through trickery
32
33
34
35
36
37
38
39
Drag and Drop
40
41
42
43
44
45
46
47
48
49
50
Multiple Choice
Which of the following makes a virus different from a worm?
A worm requires human intervention to spread.
A virus requires human intervention to spread.
A virus is in computer code, and a worm is on web pages.
A worm is in computer code, and a virus is on web pages.
51
Multiple Choice
This type of software collects information about you without your knowledge and/or consent.
Spyware
Adware
Malware
Fraudware
52
Multiple Choice
What type of malware misleads users of its true intent?
Virus
Worm
Trojan horse
Rootkit
53
Multiple Choice
In data classification, your name, address, date of birth, and email are all examples of what?
Protected health information (PHI)
Protected identifiable data (PID)
. Personally identifiable information (PII)
Personally linked user information (PLUF)
Show answer
Auto Play
Slide 1 / 53
SLIDE
Similar Resources on Wayground
48 questions
Texas Revolution
Presentation
•
7th Grade
49 questions
The Principles of Design
Presentation
•
6th - 8th Grade
51 questions
Introduction To Cybersecurity
Presentation
•
6th - 8th Grade
51 questions
Internet Basics (Dor)
Presentation
•
6th - 8th Grade
51 questions
European Economic Factors
Presentation
•
6th - 8th Grade
49 questions
Contact and Noncontact Forces
Presentation
•
6th - 9th Grade
49 questions
Conflicts and Compromises (Pre-Civil War)
Presentation
•
6th - 9th Grade
52 questions
7.1 Energy Transformations
Presentation
•
6th - 8th Grade
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade