

Cyber Security Lesson
Presentation
•
Computers
•
KG
•
Practice Problem
•
Medium
O. Okuwa
Used 3+ times
FREE Resource
81 Slides • 62 Questions
1
Cyber Security
Hey everyone,
Today we are going to learn about cyber security in preparation for our next IT Unit in Module 5.

2
Virus
A computer virus is a term used to describe software that can wreak havoc on your device.
3
Multiple Choice
What is the term for computer programs that can wreak havoc on your device?
Virus
Software
Computer
Digita;
4
Multiple Choice
Can anyone tell me what they think spyware is?
When someone uses your phone
A spy movie
A criminal
Software that collects data from your device
5
Spyware
Spyware is software that collects information from your device. This means that it can collect details like passwords and card information.
The scary part is that you do not even know anything has been collected.
6
What is Phishing?
Yes I spelt that right, and no I did not mean 'Fishing'.
Phishing is when a criminal pretends to be an honest person working to get your personal information.
They pretend to be from a trustworthy source to get whatever information they can from you.
7
Multiple Choice
What is Phishing?
The wrong spelling of the word fishing
A criminal who goes on a boat to find data in the sea
When someone acts like a trustworthy source to steal your information.
A bug that can get into your home
8
Multiple Choice
Which one of these is an example of a phishing email?
You won a new phone, click here to claim it.
You have a rich family member who wants to share their money. Click here to get yours.
Help I am stuck in a foreign country and I need some money to get back home.
All of the above
9
Fire Wall
A fire wall is software that monitors what happens online and protects your device from people that try to get into your computer or put bad software onto your computer.
10
Multiple Choice
What software can we use to protect our device from hackers?
Fortnite
Firewall
Microsoft Office
Google Chrome
11
Anti-Virus Software
Anti-Virus software is software that protects your device from software that wants to steal information or harm your computer.
12
Multiple Choice
What is Anti-Virus Software?
Software that protects you from all animals
Software that protects your device
Software that tells you when its time to rest so you don not get sick
Software that protects your roof
13
Multiple Choice
When should you get Anti-Virus Software.
When you are sick
If you are a doctor helping someone who is sick
When you get a new device
When it is time for you to rest
14
Cyber-Security
Lesson 1

15
16
17
Multiple Choice
Which is the most appropriate definition of a hacker?
Is someone who gains unauthorised access to an IT system such as a computer, website or email account.
Someone who accesses your home without your permission.
18
Multiple Choice
Why do people hack into computers?
Fun/challenge
Personal attack
Industrial Espionage
Revenge
All of the above
19
Multiple Choice
Which is the best definition of a black hat hacker?
Someone who breaks into computer systems to test out their security
Someone who breaks into computer systems for the government
Someone who breaks into computers systems to cause damage or make money
Someone who breaks into computer systems without getting caught
20
21
22
23
24
25
Multiple Choice
What is Malware?
Bad computer equipment
Pop up adverts on your computer
Software designed to do harm to a computer
Fake web sites
26
27
Multiple Choice
28
29
30
Multiple Choice
What is ransomware?
a hoax
a computer virus that closes/blacks access the victim's social media accounts unless a ransom is paid.
a type of malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
a new app for shopping
31
32
33
34
35
Multiple Choice
Distributed Denial of Service
Delayed Destruction of Server
Delayed Denial of Style
Delayed Denial of Service
36
37
Multiple Choice
What do DDoS attacks use?
Zombie devices
Ghost PCs
Worms
SD Cards
38
Multiple Choice
Malware hidden in another file
Any type of malware
A cookie
A breed of gecko
39
40
41
Multiple Choice
A hacker who misuses computers is know as a....?
White Hat hacker
Hacker
Cyber Criminal
Black Hat hacker
42
43
44
45
Multiple Choice
Which option below is not a reason attackers hack systems?
Financial Gain
Industrial Espionage
Personal attacks
Training
46
47
48
Multiple Choice
You received an e-mail message from someone you don't know. The e-mail requests you to click a link and provide some information. It says that in exchange, you will receive access to a site that offers incredible deals on popular items, up to 90 percent off retail cost. This offer sounds too good to be true. What type of security threat have you just encountered?
Phishing
Virus
Trojan
Pharming
49
Multiple Choice
Which option below is NOT malware
Virus
Spyware
Trojian
Firewalls
50
Multiple Choice
Malicious Software is also known as?
Anti-Virus
Firewall
Malware
Attacks
51
Multiple Choice
Which of the following people should you share your password with when they ask?
Network managers
Call centre workers
Security experts
Company managers
Nobody
52
Multiple Choice
Which of the following is not a social engineering technique?
Blagging
Hacking
Phishing
Pharming
53
Cyber Security Lesson 2
In this lesson, we will be learning about internal and external threats to organisations.

54
55
Multiple Choice
Who should know your passwords?
Only you!
Your best friends
Anyone
56
Multiple Choice
Which of these is NOT a good password?
#LooneyToons23
Ilovecats!95
password
#Iasw,aA!
57
Multiple Choice
What is the term for computer programs that attack your computer?
Malware
DangerDroids
RudeBots
Dangerware
58
59
60
61
Multiple Choice
62
Multiple Choice
Businesses, Banks, Shops, Schools and Exam Boards all keep data on you and are required to keep it safe?
True
False
63
64
65
66
67
Multiple Choice
What option below is NOT a security control?
Physical
Technical
Procedural
Legal
Environmental
68
69
70
Multiple Choice
Which option is NOT an impact of a security breach?
Data Loss
Damage to public image
Losing jobs
Reduction in productivity
Legal Action
71
Multiple Choice
What was seen as the fastest spreading email worm?
SoBig Worm
ILOVEYOU Worm
MyDoom Worm
72
73
74
75
Cyber Security Lesson 4
In this lesson, you will be learning about security measures an organisation can use to protect its staff and systems.

76
77
Multiple Choice
78
Multiple Choice
79
80
81
82
Multiple Choice
What is the definition of encryption?
Using an algorithm and a key to convert message data into a form that is not understandable without that key.
A method of trying to find the plain text from the cipher text without the decryption key.
Process of turning legible text into gobbledygook.
Using an algorithm and a key to convert encrypted message data into its plain text equivalent.
83
Multiple Choice
What is the software used to prevent, detect and remove destructive programs in a computer?
Anti-Spyware
Anti-Malware
Anti-Virus
Anti-Phishing
84
85
86
87
Multiple Choice
What does a Firewall Do?
Prevents Hackers
Install Viruses
Give you SD cards
Blocks all content
88
89
90
91
Multiple Choice
What is the special program which can detect and remove viruses from computer called?
Virus
Anti virus
Group ware
Custom
92
Multiple Choice
What type of warning are you most likely to receive if a virus is found on your system?
The computer will shut itself down
A siren will sound and continue until the virus is removed
Your anti-virus software will display a message and ask you how to proceed
93
94
95
96
Multiple Choice
Using an unsecured network is sometimes unavoidable, which one of the following describes how confidential information should be sent in that situation?
In a compressed only format.
In an encrypted format.
In an unsigned email.
As quickly as possible.
97
Multiple Choice
What is the process of converting a ciphertext into plaintext?
encryption
decryption
plaintext
cryptography
98
99
Multiple Choice
Which of these indicates a website is secure?
You found the website on Google or clicked it from a link in an email.
A little lock icon next to the website address.
The website shows a company name and logo and looks real.
100
Multiple Choice
What is AntiVirus software?
Software that blocks all unwanted ads.
Software that keeps you from getting sick.
Software that protects your device from viruses and malware.
101
Multiple Choice
Qwerty123 is a Strong Password (i.e. not a cyber security risk)
True
False
102
Multiple Choice
Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access
True
False
103
Multiple Choice
Which one of the following is NOT a type of Cyber Security Attack?
Worms
Randsomware
Spyware
Password Management
104
Cyber Security Lesson 5
In this lesson, you will learn about who has responsibility for making sure systems are safe and protected and the requirements of good a disaster recovery policy.

105
106
107
108
109
110
Multiple Choice
Install, Scan and delete spyware with a program like lavasoft
Don't open email attachments
111
Multiple Choice
112
Multiple Choice
113
Multiple Choice
114
115
116
Multiple Choice
117
Multiple Choice
118
119
120
121
122
Multiple Choice
What would be the best way to transform "unicorn" into a password?
Un!corn
un!corN10
unicorn7
Ms. Unicorn
123
Multiple Choice
What does a safe password look like?
4 to 6 lowercase letters
6-8 numbers, symbols, and letters
2 letters
No password
124
Multiple Choice
Which one of the following is a strong password?
Sian1234
Rover!
Da1syTh3C0w!
4576nine
125
126
127
Multiple Choice
What is Backing Storage?
Data storage that will retain a computer's data even after the computer is powered off
Storage you can only get online
A USB stick
A CD or DVD
128
Multiple Select
Select all of the backing storage devices
129
130
131
132
133
Multiple Choice
Which option is not somethings that should be done after an attack?
Investigate
Respond
Report
Recover
Analyse
134
135
136
137
138
139
Multiple Choice
True or False: Sam Slate's password is "sammyslate". This is a great password because it has a lot of letters.
true
false
140
Multiple Choice
Create a password you can remember.
Do
Don't
141
Multiple Choice
Use your nickname as your password.
Do
Don't
142
Multiple Choice
Use dictionary words as your password.
Do
Don't
143
Multiple Choice
Use dictionary words as your password.
Do
Don't
Cyber Security
Hey everyone,
Today we are going to learn about cyber security in preparation for our next IT Unit in Module 5.

Show answer
Auto Play
Slide 1 / 143
SLIDE
Similar Resources on Wayground
135 questions
Unit 1 Lesson 2
Presentation
•
9th - 12th Grade
134 questions
1º Revisão primeiro Trimestre
Presentation
•
9th Grade
137 questions
Scratch
Presentation
•
6th Grade
138 questions
December 7 (Monday)
Presentation
•
KG
138 questions
Form of Energy
Presentation
•
1st - 3rd Grade
137 questions
DEVELOPMENT OF POLITICAL PARTIES IN NIGERIA
Presentation
•
12th Grade
140 questions
m6/12 final exam
Presentation
•
11th Grade
140 questions
Dante Certification Level 1 Notes- PPT
Presentation
•
12th Grade
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade
Discover more resources for Computers
31 questions
Easter Trivia
Quiz
•
KG - 12th Grade
20 questions
Capitalization in sentences
Quiz
•
KG - 4th Grade
10 questions
GMAS ELA Review
Quiz
•
KG - University
10 questions
How to Catch a Dinosaur
Quiz
•
KG - 5th Grade
10 questions
2D and 3D Shapes Review
Presentation
•
KG - 3rd Grade
20 questions
Place Value
Quiz
•
KG - 3rd Grade
26 questions
Customary Measurement
Quiz
•
KG - University
10 questions
Kindergarten Count to 100
Quiz
•
KG