

year 11
Presentation
•
Computers
•
10th Grade
•
Practice Problem
•
Medium
Ehtesham Malik
Used 1+ times
FREE Resource
48 Slides • 27 Questions
1
Network Threat and Security
Year 11
Do Now
2
Open Ended
How can you get in or out of a Castle?
3
Open Ended
Why is network security important in today's world of internet and web technologies?
4
5
6
Fill in the Blank
A ___ is a system that filters network traffic to protect against unauthorized flows of data in or out of the network.
7
8
Multiple Select
Which of the following are methods used to protect networks?
Firewall
User privileges
Ransomware
Social engineering
9
10
11
Multiple Choice
What is social engineering in the context of network security?
A method where hackers use tricks to get people to share secrets like their passwords.
A type of malware that encrypts files and demands payment.
A system that filters network traffic.
A setting that controls user actions on a network.
12
13
Open Ended
Describe two reasons why it is important to be careful with passwords and have strong protections to stop hackers.
14
Open Ended
Explain how a cyberattack can impact a business and its customers, using the example of the UK retailer in 2025.
15
Multiple Choice
Which of the following best describes why network security is important?
To ensure only authorized users can access sensitive data and prevent misuse, loss, or theft of information.
To make networks faster and more efficient.
To allow more devices to connect to the network.
To reduce the cost of network hardware.
16
17
Multiple Choice
Which of the following is NOT a reason why good security is important for networks?
To protect people from fraud and identity theft
To protect organisations from reputational damage and legal consequences
To make devices more expensive
To protect devices from being hacked or damaged
18
19
Multiple Choice
Based on the information in slides 1 and 2, what are some common risks that network security aims to prevent?
Fraud, phishing, identity theft, and data leaks
Hardware failure and slow internet
Increased network speed
Better user experience
20
21
22
Open Ended
Explain why organisations in the UK must follow the Data Protection Act 2018 and what consequences they might face if they do not comply.
23
24
Fill in the Blank
Networks are extremely vulnerable to attack because they can ___ many locations and have many users.
25
26
Open Ended
Describe two ways in which weak devices can compromise the security of a network. Use examples from the slides to support your answer.
27
Multiple Select
Which of the following are examples of weak points that can allow attackers into a network?
An employee’s laptop with no password
An unprotected USB stick
A student accidentally clicking a phishing link
A secure server with strong encryption
28
29
Multiple Choice
Why did the ransomware attack in late 2023 force hospitals to postpone appointments and rely on manual record keeping?
Because attackers exploited weak security on staff devices, disrupting digital systems.
Because hospitals had too many patients to handle.
Because there was a shortage of doctors.
Because the internet was down in the entire country.
30
31
Open Ended
Explain how network policies can help prevent incidents like the ransomware attack described in the first slide.
32
33
Multiple Choice
Which of the following are examples of network policies?
Acceptable use policies, archiving policies, backup policies, disaster recovery policies
Password sharing, social media posting, online shopping, file deletion
Network speed, device color, office location, employee age
Lunch breaks, holiday schedules, dress code, parking rules
34
35
Fill in the Blank
An acceptable use policy (AUP) is a set of rules that users must ___ to.
36
37
Open Ended
List two likely rules that might be included in an acceptable use policy (AUP).
38
39
Fill in the Blank
Archiving policies may take account of guidelines such as ___ that specify how to treat personal data.
40
41
Multiple Choice
Which of the following is NOT typically included in a backup policy?
The frequency of backups and who is responsible for them
The type and location of the backup
Protocols for naming and dating backups
A ban on online gambling or social media
42
43
Open Ended
List two types of disasters that a disaster recovery policy should address.
44
Multiple Choice
What is the main purpose of a disaster recovery policy in an organization?
To prevent all disasters from occurring
To allow an organization to resume business quickly after or during a disaster
To ensure backups are named and dated correctly
To stop employees from using social media
45
46
Multiple Choice
Which of the following rules would most likely be found in an acceptable use policy (AUP) for a network?
instructions for how often to back up important data
a ban on online gambling or social media
instructions for how to reinstall software from a backup disk
47
48
49
Fill in the Blank
Protecting data on networks is very important because networks carry sensitive information like personal details, payment information, and school records. If this data isn't protected, it can be ___, lost, or misused.
50
51
Open Ended
Describe two different types of harm that can happen if network data is not protected.
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
Open Ended
What is one key concept you learned about network security in this lesson?
Network Threat and Security
Year 11
Do Now
Show answer
Auto Play
Slide 1 / 75
SLIDE
Similar Resources on Wayground
68 questions
SEI Tues 12.02
Lesson
•
10th Grade
67 questions
Thermochemistry
Lesson
•
10th Grade
69 questions
Biology 5.1, Estimating Population Size Gizmo, & 5.2 Review
Lesson
•
9th - 10th Grade
67 questions
G10_5.1: Reactions and Equations
Lesson
•
10th Grade
71 questions
Properties of Water Part 1
Lesson
•
10th Grade
67 questions
biomolecules grade 10
Lesson
•
10th Grade
71 questions
F5(R) The Env L31
Lesson
•
10th Grade
68 questions
Unit 1 Mixed Practice V2
Lesson
•
10th Grade
Popular Resources on Wayground
10 questions
5.P.1.3 Distance/Time Graphs
Quiz
•
5th Grade
10 questions
Fire Drill
Quiz
•
2nd - 5th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
15 questions
Hargrett House Quiz: Community & Service
Quiz
•
5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade