Search Header Logo
Sohero: Cyber Security

Sohero: Cyber Security

Assessment

Presentation

Mathematics

11th Grade

Practice Problem

Easy

CCSS
6.NS.B.3, RI.11-12.8, RI.11-12.3

+8

Standards-aligned

Created by

Richard Pope

Used 3+ times

FREE Resource

6 Slides • 4 Questions

1

Open Ended

What do we mean by the term "Risk"

2

Hotspot

Can you identify the risks in this image?

3

media
media

Last lesson, we looked at an
introduction to the Sphero and
how it can be programmed in
Swift

We learned about the sequence
Swift operates instructions in
and how we define our language
syntax

What we covered last time

4

media
media

Cyber Security

KS3 Computer Science

5

media
media

Understand what we mean by the term

“Cyber security” and the dangers it poses

to systems

Learn about the ways in which hackers

exploit vulnerabilities in networks

Apply our knowledge of resolving cyber

security risks using Spheroes in a scenario

Learning Objectives

6

media
media

Hackers

By now, we should all be familiar
with the job role of a hacker

They attempt to steal user data
from a large company by gaining
access to devices

As Computer Scientists, we
should all be aware of the
different techniques hackers
might utilise in order to steal
your data

Can anyone name any
examples?

7

Match

Below are a list of techniques hackers use to gain access to user data. Match up the keyword to the correct definition

A technique where hackers are able to see data unencrypted data being sent around the network

A form of malware which is downloaded to a computer to delete important system data

A form of malware which disguises itself as useful software but actually damages your computer instead

A technique where hackers exploit weak points in code which is only present on older versions of software

A technique where hackers deploy psychological tactics to gain access to your information

Unsecure networks

Virus

Trojan

Outdated Software

Social Engineering

8

9

Open Ended

In your own words, provide a definition of the term "Pen Testing"

10

media
media

Hacker Havoc

Split yourself into two teams

Hackers: Your job is to reach the
other teams goal

Cyber Security: Your job is to
prevent the hackers from
reaching your goal

Teams can’t manually control
the robot and may only program
instructions

Each team will run their code at
the same time

After each round, you may want
to change your code to bypass
the other teams changes

What do we mean by the term "Risk"

Show answer

Auto Play

Slide 1 / 10

OPEN ENDED