Search Header Logo
Introduction to Cybersecurity -Module 2

Introduction to Cybersecurity -Module 2

Assessment

Presentation

Computers

9th Grade

Practice Problem

Medium

Used 5+ times

FREE Resource

44 Slides • 23 Questions

1

Module 2: Attacks, Concepts and Techniques

2

Analyzing a Cyber Attack

3

Starter

§Your phone freezes 📱

§Ads pop up everywhere 😡

§Battery drains fast 🔋

§Messages are sent without you 😱

4

welcome to the world of Cyber Attack !!!!

5

​Types of Malware

By

6

Malware

Malware

Fun Explanation

🕵️ Spyware

“The Stalker – watches everything you do”

📢 Adware

“The Pop-Up Monster – never shuts up”

🎭 Trojan

“The Fake Friend – looks safe, is evil”

💰 Ransomware

“The Kidnapper – pay or lose your files”

🧬 Virus

“Needs a host to spread”

🐛 Worm

“Spreads fast without permission”

🔓 Backdoor

“Secret entrance for hackers”

7

Cybercriminals:

use many different types of malicious software, or malware, to carry out their activities. The use of malware is any code that can steal data, bypass access controls, or cause harm to or compromise a system. Knowing the different types and how they spread is key to containing and removing them. 

8

spyware

Spyware monitors your online activity and can log every key you press on your keyboard and capture almost any of your data, including sensitive personal information such as your online banking details. Its design is to track and spy on you. Spyware does this by modifying the security settings on your devices. 

9

Multiple Choice

Which type of malware is designed to secretly monitor user activity and capture sensitive information such as keystrokes and banking details?

1

adware

2

spyware

3

virus

4

worm

10

Adware

Often, adware installs with some software versions, and its design is to automatically deliver advertisements to a user, most often on a web browser. You know it when you see it! It’s hard to ignore when facing constant pop-up ads on your screen. 

•It is common for adware to come with spyware. 

11

Multiple Choice

What is the primary purpose of adware?

1

Encrypt files for ransom

2

Gain unauthorized system access

3

Display unwanted advertisements

4

Delete system files

12

Backdoor

This malware gains unauthorized access by bypassing the normal authentication procedures to access a system. As a result, hackers can access resources within an application and issue remote system commands. 

•A backdoor works in the background and is difficult to detect.

13

Multiple Choice

Which malware bypasses normal authentication procedures to give attackers remote access to a system?

1

Trojan Horse

2

Rootkit

3

Backdoor

4

Scareware

14

Ransomware

The design of this malware is to hold a computer system or the data it contains captive until it makes a payment. Ransomware usually encrypts your information so you can't access it. 

•Some versions of ransomware can take advantage of specific system vulnerabilities to lock it down. Ransomware is often spread through phishing emails that encourage you to download a malicious attachment or through a software vulnerability. 

15

Multiple Choice

Ransomware typically does which of the following?

1

Displays fake security warnings

2

Encrypts data and demands payment

3

Replicates itself across networks

4

Shows pop-up advertisements

16

scareware

This type of malware uses 'scare' tactics to trick you into taking a specific action. Scareware mainly consists of operating system-style windows that warn you that your system is at risk and needs to run a specific program to return to normal operation. 

•If you agree to execute the specific program, your system will become infected with malware.

17

Multiple Choice

Which malware uses fake security alerts to trick users into installing malicious software?

1

Virus

2

Worm

3

Scareware

4

Spyware

18

Rootkit

The design of this malware is to modify the operating system to create a backdoor, which attackers can then use to access your computer remotely. Most rootkits use software vulnerabilities to access resources that shouldn’t be accessible (privilege escalation) and modify system files. 

•Rootkits can also modify system forensics and monitoring tools, making them very hard to detect. If a rootkit infected a computer, wipe the computer and reinstall any required software. 

19

Multiple Choice

What makes rootkits particularly difficult to detect?

1

They spread only via email

2

They require user interaction

3

They modify the operating system and security tools

4

They display visible pop-ups

20

​Viruses

A virus is a computer program that, when executed, replicates and attaches itself to other executable files, such as a document, by inserting its code. Most viruses require end-user interaction to initiate activation and can act on a specific date or time. 

Viruses, such as those that display a funny image, can be relatively harmless. Or they can be destructive, such as those that modify or delete data. 

Viruses can also be programmed to mutate to avoid detection. USB drives, optical disks, network shares, or email spreads most viruses. 

21

Multiple Choice

Which statement best describes a computer virus?

1

It spreads automatically without user action

2

It disguises itself as legitimate software

3

It attaches itself to executable files and replicates

4

It only affects network devices

22

Trojan horse

This malware carries out malicious operations by masking its true intent. It appears legitimate but is very dangerous. Trojans exploit your user privileges, and image files are where you find them, audio files or games. 

•Unlike viruses, Trojans do not self-replicate but act as decoys to sneak malicious software past unsuspecting users.

23

Multiple Choice

How is a Trojan Horse different from a virus?

1

Trojans self-replicate, viruses do not

2

Trojans disguise themselves as legitimate software

3

Trojans only infect hardware

4

Trojans cannot cause damage

24

Worms

This type of malware replicates itself to spread from one computer to another. Unlike a virus, which requires a host program, worms can run alone. Other than the initial infection of the host, they do not require user participation and can spread very quickly over the network. 

•Worms share similar patterns: They exploit system vulnerabilities, have a way to propagate themselves, and all contain malicious code (payload) to cause damage to computer systems or networks. 

•Worms are responsible for some of the most devastating attacks on the Internet. In 2001, the Code Red worm infected over 300,000 servers in just 19 hours.

25

Multiple Choice

Which type of malware can spread across networks without user interaction?

1

Virus

2

Trojan horse

3

Worm

4

Adware

26

"Malware always leaves clues"

27

Symptoms of Malware

Regardless of the type of malware that infects a system, you can look out for some common symptoms. These include: 

•an increase in central processing unit (CPU) usage, which slows down your device 

•your computer freezing or crashing often 

•a decrease in your web browsing speed 

•unexplainable problems with your network connections 

•modified or deleted files 

•the presence of unknown files, programs, or desktop icons 

•unknown processes running 

•programs turning off or reconfiguring themselves 

sending emails without your knowledge or consent

28

Multiple Choice

Which of the following is a common symptom of malware infection?

1

Faster internet speed

2

Improved system performance

3

Unknown programs or processes running

4

Increased storage space

29

Methods of infiltration

Replace with sub-header

Replace this with your body text. Duplicate this text as many times as you would like. All provided templates can be reused multiple times. Wish you a good day.

Happy teaching!

30

social Engineering

•Social engineering is manipulating people into performing actions or divulging confidential information. Social engineers often rely on people’s willingness to be helpful but also prey on their weaknesses. 

31

Social Engineering

Pretexting

This is when an attacker calls an individual and lies to them to gain access to confidential data. 

For example, pretending to need a person’s personal or financial data to confirm their identity

32

Social Engineering

Tailgating

This is when an attacker quickly follows an authorized person into a secure, physical location. 

Happy teaching!

33

Social Engineering

Something for something (quid pro quo) 

This is when an attacker requests personal information from someone in exchange for something, like a gift.

34

Multiple Choice

What is social engineering?

1

Using software to break into systems

2

Manipulating people to give information or perform actions

3

Sending viruses through email

4

Hacking computers using codes

35

Multiple Choice

Why are social engineers often successful?

1

They use very advanced computers

2

They attack only weak networks

3

They take advantage of people’s trust and willingness to help

4

They always use malware

36

Multiple Choice

An attacker pretends to be an IT staff member and urgently asks for login details. What type of attack is this?

1

Tailgating

2

Quid pro quo

3

Pretexting

4

DoS

37

Multiple Choice

Which social engineering technique involves following an authorized person into a secure area?

1

Pretexting

2

Tailgating

3

Phishing

4

Password spraying

38

Multiple Choice

An attacker offers a free gift in exchange for personal information. This is called:

1

Pretexting

2

Tailgating

3

Quid pro quo

4

Dictionary attack

39

Dos Vs DDos

one student blocks the door -> Dos
Many students block the door -> DDos

40

Denial-of-Service(DoS)

Denial-of-Service (DoS) A Denial-of-Service (DoS) attack happens when a computer, website, or app gets too many requests at once and cannot handle them.
Result:

  • Website becomes slow

  • App freezes

  • Service crashes

41

Distributed Dos

A Distributed DoS (DDoS) attack is similar to a DoS attack but originates from multiple coordinated sources. For example: 

A Distributed Denial-of-Service (DDoS) attack is when many computers attack one website or system at the same time, causing it to crash.

42

Distributed Dos

Hackers infect normal computers by:

  • Unsafe websites

  • Infected emails

  • Fake downloads

Those infected computers become:

🧟 ZOMBIES (they still look normal!)

43

Multiple Choice

What is a Denial-of-Service (DoS) attack?

1

Stealing passwords from users

2

Blocking network access by overwhelming it

3

Modifying website content

4

Sending fake emails

44

Multiple Choice

What is the main difference between DoS and DDoS attacks?

1

DDoS uses passwords; DoS does not

2

DoS uses malware; DDoS does not

3

DDoS comes from multiple sources, DoS from one

4

DoS is illegal, DDoS is legal

45

"Hackers control thousands of computers like zombies

46

Botnet

A botnet is a zombie army controlled by one hacker.
A
bot computer is a normal computer that becomes infected after visiting unsafe websites or opening infected emails or files.

  • A botnet is a large group of these infected computers (bots) connected through the internet and secretly controlled by hackers.

  • Botnets can contain thousands or even millions of computers.

47

Multiple Choice

What is a botnet?

1

A secure computer network

2

A group of computers controlled by an attacker

3

A type of antivirus software

4

A cloud storage system

48

Man-in-the-Middle

" Someone secretly listens to your message in between

49

On-Path attacks

On-path attacks happen when an attacker secretly places themselves between two devices (like your browser and a website).

  • The attacker can listen to, change, or steal information being sent.

  • This type of attack is called a Man-in-the-Middle (MitM) or Man-in-the-Mobile attack.

  • In a MitM attack, the attacker takes control without the user knowing.

50

SEO Poisoning

" You Google homework help...
First result is fake and dangerous " 

51

SEO Poisoning

SEO (Search Engine Optimization) is normally used to help websites appear higher in search results.

  • Search engines like Google show results based on how relevant a website is to what you search.

  • SEO poisoning happens when attackers misuse SEO techniques to push malicious websites to the top of search results.

52

Password Attacks

write passwords:

  • 123456

  • password

  • A7#pL!9

​Which one would hackers love?

53

Password Attacks

Password Spraying

  • Password spraying is when a hacker tries one common password (like Password123) on many different accounts.

  • Then they try another common password (like qwerty) on those accounts.

  • This method avoids account lockouts, so it is harder to detect.

Dictionary Attack

  • A dictionary attack is when a hacker tries many different passwords from a dictionary or common password liston one account.

  • The goal is to guess the correct password by testing common words people often use.


54

Password Attack

  • Brute-force = try all password combinations

  • Rainbow attack = match password hashes using tables

  • Traffic interception = steal passwords while they are being sent

55

Multiple Choice

What type of attack involves secretly intercepting communication between two devices?

1

DoS

2

SEO poisoning

3

Man-in-the-middle (MitM)

4

Tailgating

56

Multiple Choice

What is SEO poisoning?

1

Improving website ranking legally

2

Using search engines to spread malware

3

Encrypting website data

4

Blocking search results

57

Multiple Choice

What is password spraying?

1

Trying one password on one account many times

2

Trying many passwords on one account

3

Trying common passwords across many accounts

4

Stealing passwords from browsers

58

Security Vulnerability and Exploits

59

​- Name of Author

" Even Strong systems fail if there's a crack. " 

60

Hardware Vulnerabilities/Meltdown and Spectre

Hardware vulnerabilities are weaknesses caused by flaws in the design of physical computer parts.

  • One example is RAM (memory), which is made of many tiny components called capacitors.

  • These capacitors are placed very close together.

  • Because they are so close, changing one capacitor can accidentally affect nearby capacitors.

  • Attackers can take advantage of this behavior to access or change data they should not be able to.

61

Software Vulnerabilities

Errors in the operating system or application code usually introduce software vulnerabilities
Most software security vulnerabilities fall into several main categories
Buffer Overflow: 
Non-validated input: 
Race conditions: 
Weaknesses in security practices: 
Access Control problems: 

62

Software Updates

•The goal of software updates is to stay current and avoid exploiting vulnerabilities. Microsoft, Apple, and other operating system producers release patches and updates daily. The companies or organizations responsible for them update applications such as web browsers, mobile apps, and web servers. 

63

The cybersecurity Landscape

64

Cryptocurrency

“Digital money locked by math 🔐”

•Cryptocurrency is digital money used to buy goods and services, using strong encryption techniques to secure online transactions. Banks, governments, and even companies like Microsoft and AT&T are very aware of its importance and are jumping on the cryptocurrency bandwagon! 

65

Cryptojacking

Cryptojacking is an emerging threat that hides on a user's computer, mobile phone, tablet, laptop, or server, using that machine's resources to 'mine' cryptocurrencies without the user's consent or knowledge. 

66

Multiple Choice

What is cryptocurrency primarily used for?

1

Storing physical cash

2

Buying goods and services digitally

3

Replacing all government-issued money

4

Running computer operating systems

67

Multiple Choice

What is cryptojacking?

1

Legal cryptocurrency mining

2

A method of encrypting wallets

3

Unauthorized use of devices to mine cryptocurrency

4

A type of digital payment

Module 2: Attacks, Concepts and Techniques

Show answer

Auto Play

Slide 1 / 67

SLIDE