Search Header Logo
S2 Cyber Security revision

S2 Cyber Security revision

Assessment

Presentation

Computers

8th Grade

Easy

Created by

G Alexander-Doyle

Used 19+ times

FREE Resource

17 Slides • 10 Questions

1

​S2 Cyber Security revision

2

Our “Connected” World is Under Threat

One of the fastest growing areas of Computing Science is Cyber Security to protect our life vital data, networks, systems and devices.
In all parts of our lives we rely on devices and networks like the Internet to be always connected to get us the data we need. 

As almost all areas of our lives are made easier by devices and our entire country relies on technology to function we are made more vulnerable.

media
media
media
media

3

Poll

Question image

How many digital devices do you use over the course of the day? This would include your mobile phone, computers, school iPads, smart televisions, games consoles etc.

2 or less

3 or less

4 or less

5 or more

4

Ethical hackers

The role of an ethical hacker is to test an organisation's security to see if it can be breached. If they find a means of getting past security, an ethical hacker will report back to the company and advise on the best way of fixing the issue. Ethical hackers are sometimes called white hat hackers.

5

Multiple Choice

Question image

An ethical hacker is sometimes referred to as a?

1

Black hat hacker

2

Grey hat hacker

3

White hat hacker

6

Open Ended

Question image

What is the role of an ethical hacker?

7

Phishing

Cyber criminals try to trick people into giving up personal info, logins, account information etc by sending e-mail or text messages to lots of people. This is called phishing and each year many people fall victim to phishing scams.

media

​The e-mail is designed to look like it came from a legitimate company and contains a message telling the user they have to click a link to enter their details.

8

Phishing

There are several tell-tale signs that an e-mail or text may be a phishing e-mail. Have a look at the example on the right.

media

Vague greeting

Link to a fake website

Sense of urgency

Spelling/grammar mistakes

media
media
media
media

9

Draw

Highlight the red flags on the e-mail which confirm it as a phishing scam.

10

Malware

Malware is short for malicious software and includes viruses, trojans, worms, keystroke loggers, spyware, adware and ransomware. All of these programs are designed to damage or disrupt your computer or steal sensitive data.

media

11

Fill in the Blank

Question image

Malware is a term which is short for _________ software.

12

Command line terminal

A command line terminal allows a hacker to type in commands to access files in a computer system remotely. The command is typed in and the hacker can press the enter or return key on the keyboard to execute the command. In the example below we have used the ping command to check if the search engine Google is online. A command line terminal does not have icons, menus and graphics.

media

13

Open Ended

Question image

Explain the difference between a command line interface and a graphical user interface.

14

ip address

An ip (internet provider) address can be used to identify a computer which is connected to the internet. It is a unique number which can then be used to send or receive data to or from the computer. Your ip address can also show your location.

media

15

Legislation

The Computer Misuse Act was brought in in 1990. This piece of legislation makes hacking and the creation and spreading of malware against the law. If caught, a cyber criminal can face jail time or a large fine.

media

16

Security software - Firewalls

A firewall is a system on a device to check all data traffic coming into and out of a network to make sure it is allowed.
It is designed to stop hackers and malware from being able a computer system.

17

Multiple Choice

Question image

Which Act of parliament was developed which makes the act of hacking illegal?

1

Data Protection Act

2

Computer Misuse Act

3

Copyright Designs & Patents Act

4

The Hacking and Malware Act

18

Open Ended

Question image

How does a firewall protect a person's computer?

19

Digital forensics

Digital/cyber forensics is the process of checking digital devices for evidence of criminal activity. A criminal's web browsing history, files and conversations could potentially highlight their involvement in a crime.

20

Data logging

The process of data logging is when the police record information about a device which has been recovered from a crime scene. They will make a note of the manufacturer, serial number, type of device, where and when it was found etc.

media
media

21

Cloning

Once a device has been logged, it will be cloned. This involves making an exact copy of the contents of the device which can be examined without making changes to the original. The dd command is used in the command-line terminal to create a clone.

media

22

Hashing

Once a device has been cloned, we need to ensure we have an exact copy. This is achieved with hashing.
To do this, we
calculate a hash (number) that we can treat like a digital fingerprint for the file. Only this file (or an exact copy of it) will have the same number.

media

23

Match

Question image

Match the following terms with the correct description

Digital forensics

Cloning

Data logging

Hashing

Checking a digital device for evidence

Creating a copy of files on a device

Recording information about a device

Generates a matching digital fingerprint

24

Over-sharing

Making too much information about yourself/your business available for anyone to see is never a good idea, this is referred to as over-sharing.

media

Auld Lang Slice, the pizza restaurant, had posted information on individual members of staff. This leaves them open to social engineering attacks.

25

Encryption

Encryption is a method of keeping data secure that involves scrambling/encrypting sensitive data so that it cannot be read by unauthorised users. Only authorised users who have a special key can decrypt and read the message.

media

26

Meta-data

Meta data is data about data which is usually hidden inside files.
Meta data in a digital photograph may include information such as the date and time the photo was taken, the make of camera used to take the photo and even the location the photo was taken.

media

Date: 29/09/24
Time: 14:30
Camera: Canon EOS 550D
Latitude: 56.001877
Longitude:-3.783913

27

Multiple Select

Question image

Which of the pieces of information below might be stored as meta data in a digital photograph?

1

The names of the people in the photo

2

The location the photo was taken

3

The date the photo was taken

4

How sunny it was when the photo was taken

5

What brands of clothing the people are wearing

​S2 Cyber Security revision

Show answer

Auto Play

Slide 1 / 27

SLIDE