Search Header Logo
Cyber Security - Lesson 2

Cyber Security - Lesson 2

Assessment

Presentation

Computers

9th - 12th Grade

Practice Problem

Easy

Created by

Mr Dickinson

Used 24+ times

FREE Resource

12 Slides • 31 Questions

1

media
media

Cyber Security

1.

Cyber Attacks

2.

Computer Misuse Act (1990)

2

Poll

Question image

Do you think you use strong passwords on your digital accounts?

Yes

No

Not sure

3

media
media

Learning Objectives

  1. Define hacking in the context of
    cybersecurity.

  1. Explain how a DDoS attack can
    impact the users of online
    services.

  1. Identify strategies to reduce the
    chance of a brute force attack
    being successful.

  1. Explain the need for the Computer
    Misuse Act (1990).

4

media

5

media
media
media

Hacking

Definition:
Hacking is the unauthorised access or
manipulation of computer systems
and networks.
It is a serious crime and can have
severe consequences for individuals
and organisations.

Examples of hacking include:
Attempting to gain access to

someone else's computer or
network without permission

Stealing personal information, such

as passwords or credit card
numbers.

Distributing malware or viruses to

damage or disrupt computer systems

Launching a denial of service (DoS)

attack to overload a website or
network.

6

Multiple Choice

Question image

Is hacking a serious crime?

1

Yes

2

No

7

Open Ended

Question image

What is hacking? Type your DETAILED answer below.

8

Drag and Drop

Question image
An example of hacking is distributing ​
to damage or disrupt computer systems.
Drag these tiles and drop them in the correct blank above
malware
words
computers
keyboards

9

Drag and Drop

Question image
An example of hacking includes what?​
Drag these tiles and drop them in the correct blank above
Stealing
personal
information
swaping
protecting

10

media
media
media

Hackers want data, what is data?

When a system is hacked, the hacker is often
trying to steal the data on that system.
Data are the lists of words and numbers that do
not mean anything by themselves. They are raw
facts and figures.

Examples of data are:
Leeds, tree, 17, yes, no, TV, news, king, lane,
Netflix.

This data can be put together to give
it meaning. This is called processing
the data. This data then becomes
information.

When the data is processed it can
start to build a profile about
someone, e.g.

This person lives at a house on King
Lane, number 17. There is a tree in
the garden. They watch the news on
TV. Yes they have a Netflix account.

11

Multiple Choice

Question image

Whai is data?

1

Detailed reports about something

2

lists of numbers and words that do not have any meaning

3

lists of just numbers that have some meaning

4

lists of just words that have some meaning

12

Multiple Choice

Question image

What is information?

1

Lists of words and numbers

2

Unprocessed data

3

Data that has been processed and has meaning

4

Data that has no meaning

13

Open Ended

Question image

Explain in your own words the difference between data and information. You must provide a DETAILED answer, with examples.

14

media
media

Hackers are not all bad!

Ethical hackers use their
knowledge to secure and improve
the technology of networks.
They are the good hackers.
They provide an essential service
to organisations by looking for
vulnerabilities that can lead to a
security breach.

15

Multiple Choice

Question image

What is a hacker?

1

A computer users

2

Someone who makes sure computer rooms are secure when not in use

3

Someone who cleans computer systems

4

Someone who uses there knowledge to gain access to a computer system

16

Multiple Choice

Question image

What does an ethical hacker do?​

1

steals data from a computer system

2

finds vunerabilities in a computer system

3

breaks computers

17

Match

Question image

Match the following...

Trys to stops hackers geting in to computer systems

A way in to a computer system

Does bad things to computer systems

Needs to be strong to stop hackers getting in to computer systems

Ethical hacker

Vunerability

Hacker

Passwords

18

media
media

Why do hackers hack computer systems?

Definition:
Hacking is the gaining unauthorised
access or control of computer
systems and networks.
It is a serious crime and can have
severe consequences for individuals
and organisations.

There are many reasons why hackers
hack. Some of them are:
To steal data
To disrupt services
For financial gain
For political reasons (espionage

and activism)

For fun (planting the flag)
For ethical reasons

19

Open Ended

Question image

Explain the difference between a hacker and an ethical hacker.

20

media
media

DoS and DDoS Attacks

DoS – Denial of Service Attack
DDoS – Distributed Denial of Service Attack
These types of attacks try to shut down
computer servers and networks.
They do this by sending so much data to the
servers that the servers can not handle all of
the data sent to them.
This makes the server crash and not work.
This impacts users because they can not
access their data or accounts.

21

Reorder

Question image

Reorder the following..

Denial

of

Service

attack

1
2
3
4

22

Reorder

Question image

Reorder the following

Distributed

Denial

of

Service

Attack

1
2
3
4
5

23

Drag and Drop

Question image
DoS and DDos attacks will​
a computer server.
Drag these tiles and drop them in the correct blank above
shut
down
start
corrupt
reboot

24

Fill in the Blanks

media image

Type answer...

25

media
media

Brute Force Attacks

Brute force attacks
use a trial and error
approach to
systematically guess
login details.
A program will run
and guess millions
of words to try and
match them to
users passwords.

26

Multiple Choice

Question image

A brute force attack is what?

1

Not locking the door to the computer room

2

Someone breaking a computer screen

3

Uses trial and error to work out loging details

4

A method of protecting yiour account details

27

Multiple Select

Question image

Login details include...

1

The computer number

2

Password

3

Username

4

Room number

28

Multiple Choice

Question image

Another word for a hacker is...

1

Coder

2

Cyber criminal

3

Programmer

4

User

29

media
media

Passwords ybN34&7$h47(8j

Passwords are one very important
defence against cyber crime.
It is important to have a strong
password for any accounts you
have.
This also applies to organisations
and businesses that store data
about people they have on their
computer systems.

30

Reorder

Question image

Reorder the following

Strong

passwords

are

very

important

1
2
3
4
5

31

Multiple Select

Question image

Which two of the following are weak passwords?

1

dog

2

yt^7vvMb5f

3

yellow1

4

JgBmmNb((*

32

Open Ended

Question image

1. Explain what would make a strong password.

2. Give three examples of sensible but strong passwords explaining why you consider them strong.

33

Multiple Select

Question image

Which two of the following would be good, strong passwords?

1

admin123

2

yellowsun12

3

GlaPMay&*()$cdF

4

?ellyNi^ht765%$x

34

media

35

Reorder

Question image

Reorder the following

Computer

Misuse

Act

(1990)

1
2
3
4

36

Fill in the Blanks

media image

Type answer...

37

Multiple Choice

Question image

How many sections are there in the computer misuse act?

1

2

2

3

3

4

4

5

38

Multiple Select

Question image

Which of the following are the three sections of the Computer Misuse Act?

1

Attempting to steal the computer room keys

2

Unauthorised access to computer material

3

Unauthorised access with intent to commit futher crimes or offences

4

Unauthorised acts with intent to impair the operation to computer systems

39

Open Ended

Question image

Explain in detail, how you would protect your home network, devices and accounts from cyber security attacks.

40

​Extension Tasks

​The next three slides are extension task activities.

You will gain extra marks for each one you complete in detail.

41

Open Ended

Question image

1. List all the devices in your home that are connected to the internet.

2. Explain how these devices could get hacked.

3. Explain how you could protect these device from cyber attack.

42

Open Ended

Question image

Russian Cybercrime Group.

In January of 2022, KP Snacks, which manufactures KP Nuts, Hula Hoops, Nik Naks, Tyrell’s, Pom-Bears, and others, suffered a ransomware attack.

Explain what a ransomware attack is

( you can research this to help with your answer)

43

Open Ended

Question image

Amazon Web Service DDoS attack in 2020.

A gigantic DDoS attack took place in February 2020 crippling Amazon Web Services.

Explain in DETAIL what a DDoS attack is.

(you can use the internet to help you)

media
media

Cyber Security

1.

Cyber Attacks

2.

Computer Misuse Act (1990)

Show answer

Auto Play

Slide 1 / 43

SLIDE