
Cyber Security - Lesson 2
Presentation
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Easy
Mr Dickinson
Used 24+ times
FREE Resource
12 Slides • 31 Questions
1
Cyber Security
1.
Cyber Attacks
2.
Computer Misuse Act (1990)
2
Poll
Do you think you use strong passwords on your digital accounts?
Yes
No
Not sure
3
Learning Objectives
Define hacking in the context of
cybersecurity.
Explain how a DDoS attack can
impact the users of online
services.
Identify strategies to reduce the
chance of a brute force attack
being successful.
Explain the need for the Computer
Misuse Act (1990).
4
5
Hacking
Definition:
Hacking is the unauthorised access or
manipulation of computer systems
and networks.
It is a serious crime and can have
severe consequences for individuals
and organisations.
Examples of hacking include:
• Attempting to gain access to
someone else's computer or
network without permission
• Stealing personal information, such
as passwords or credit card
numbers.
• Distributing malware or viruses to
damage or disrupt computer systems
• Launching a denial of service (DoS)
attack to overload a website or
network.
6
Multiple Choice
Is hacking a serious crime?
Yes
No
7
Open Ended
What is hacking? Type your DETAILED answer below.
8
Drag and Drop
9
Drag and Drop
10
Hackers want data, what is data?
When a system is hacked, the hacker is often
trying to steal the data on that system.
Data are the lists of words and numbers that do
not mean anything by themselves. They are raw
facts and figures.
Examples of data are:
Leeds, tree, 17, yes, no, TV, news, king, lane,
Netflix.
This data can be put together to give
it meaning. This is called processing
the data. This data then becomes
information.
When the data is processed it can
start to build a profile about
someone, e.g.
This person lives at a house on King
Lane, number 17. There is a tree in
the garden. They watch the news on
TV. Yes they have a Netflix account.
11
Multiple Choice
Whai is data?
Detailed reports about something
lists of numbers and words that do not have any meaning
lists of just numbers that have some meaning
lists of just words that have some meaning
12
Multiple Choice
What is information?
Lists of words and numbers
Unprocessed data
Data that has been processed and has meaning
Data that has no meaning
13
Open Ended
Explain in your own words the difference between data and information. You must provide a DETAILED answer, with examples.
14
Hackers are not all bad!
Ethical hackers use their
knowledge to secure and improve
the technology of networks.
They are the good hackers.
They provide an essential service
to organisations by looking for
vulnerabilities that can lead to a
security breach.
15
Multiple Choice
What is a hacker?
A computer users
Someone who makes sure computer rooms are secure when not in use
Someone who cleans computer systems
Someone who uses there knowledge to gain access to a computer system
16
Multiple Choice
What does an ethical hacker do?
steals data from a computer system
finds vunerabilities in a computer system
breaks computers
17
Match
Match the following...
Trys to stops hackers geting in to computer systems
A way in to a computer system
Does bad things to computer systems
Needs to be strong to stop hackers getting in to computer systems
Ethical hacker
Vunerability
Hacker
Passwords
Ethical hacker
Vunerability
Hacker
Passwords
18
Why do hackers hack computer systems?
Definition:
Hacking is the gaining unauthorised
access or control of computer
systems and networks.
It is a serious crime and can have
severe consequences for individuals
and organisations.
There are many reasons why hackers
hack. Some of them are:
• To steal data
• To disrupt services
• For financial gain
• For political reasons (espionage
and activism)
• For fun (planting the flag)
• For ethical reasons
19
Open Ended
Explain the difference between a hacker and an ethical hacker.
20
DoS and DDoS Attacks
DoS – Denial of Service Attack
DDoS – Distributed Denial of Service Attack
These types of attacks try to shut down
computer servers and networks.
They do this by sending so much data to the
servers that the servers can not handle all of
the data sent to them.
This makes the server crash and not work.
This impacts users because they can not
access their data or accounts.
21
Reorder
Reorder the following..
Denial
of
Service
attack
22
Reorder
Distributed
Denial
of
Service
Attack
23
Drag and Drop
24
Fill in the Blanks
Type answer...
25
Brute Force Attacks
Brute force attacks
use a trial and error
approach to
systematically guess
login details.
A program will run
and guess millions
of words to try and
match them to
users passwords.
26
Multiple Choice
A brute force attack is what?
Not locking the door to the computer room
Someone breaking a computer screen
Uses trial and error to work out loging details
A method of protecting yiour account details
27
Multiple Select
Login details include...
The computer number
Password
Username
Room number
28
Multiple Choice
Another word for a hacker is...
Coder
Cyber criminal
Programmer
User
29
Passwords ybN34&7$h47(8j
Passwords are one very important
defence against cyber crime.
It is important to have a strong
password for any accounts you
have.
This also applies to organisations
and businesses that store data
about people they have on their
computer systems.
30
Reorder
Strong
passwords
are
very
important
31
Multiple Select
Which two of the following are weak passwords?
dog
yt^7vvMb5f
yellow1
JgBmmNb((*
32
Open Ended
1. Explain what would make a strong password.
2. Give three examples of sensible but strong passwords explaining why you consider them strong.
33
Multiple Select
Which two of the following would be good, strong passwords?
admin123
yellowsun12
GlaPMay&*()$cdF
?ellyNi^ht765%$x
34
35
Reorder
Computer
Misuse
Act
(1990)
36
Fill in the Blanks
Type answer...
37
Multiple Choice
How many sections are there in the computer misuse act?
2
3
4
5
38
Multiple Select
Which of the following are the three sections of the Computer Misuse Act?
Attempting to steal the computer room keys
Unauthorised access to computer material
Unauthorised access with intent to commit futher crimes or offences
Unauthorised acts with intent to impair the operation to computer systems
39
Open Ended
Explain in detail, how you would protect your home network, devices and accounts from cyber security attacks.
40
Extension Tasks
The next three slides are extension task activities.
You will gain extra marks for each one you complete in detail.
41
Open Ended
1. List all the devices in your home that are connected to the internet.
2. Explain how these devices could get hacked.
3. Explain how you could protect these device from cyber attack.
42
Open Ended
Russian Cybercrime Group.
In January of 2022, KP Snacks, which manufactures KP Nuts, Hula Hoops, Nik Naks, Tyrell’s, Pom-Bears, and others, suffered a ransomware attack.
Explain what a ransomware attack is
( you can research this to help with your answer)
43
Open Ended
Amazon Web Service DDoS attack in 2020.
A gigantic DDoS attack took place in February 2020 crippling Amazon Web Services.
Explain in DETAIL what a DDoS attack is.
(you can use the internet to help you)
Cyber Security
1.
Cyber Attacks
2.
Computer Misuse Act (1990)
Show answer
Auto Play
Slide 1 / 43
SLIDE
Similar Resources on Wayground
36 questions
French Direct Object Pronouns
Presentation
•
9th - 12th Grade
36 questions
Classification Terms part 2
Presentation
•
9th - 12th Grade
40 questions
IGCSE Hodder Computer Chapter 1 Data Representation
Presentation
•
9th - 12th Grade
36 questions
ITF+ Module 1 Unit 2 - Using a Workstation
Presentation
•
9th - 12th Grade
35 questions
Introduction to Bonding
Presentation
•
9th - 12th Grade
38 questions
Irregular Yo verbs (Present tense)
Presentation
•
9th - 12th Grade
37 questions
Ecological relationship terms part 1
Presentation
•
9th - 12th Grade
37 questions
Ecological Relationships terms part 2
Presentation
•
9th - 12th Grade
Popular Resources on Wayground
19 questions
Naming Polygons
Quiz
•
3rd Grade
10 questions
Prime Factorization
Quiz
•
6th Grade
20 questions
Math Review
Quiz
•
3rd Grade
15 questions
Fast food
Quiz
•
7th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade