
Introduction to Cybersecurity -Module 2
Presentation
•
Computers
•
9th Grade
•
Practice Problem
•
Medium
Used 5+ times
FREE Resource
44 Slides • 23 Questions
1
Module 2: Attacks, Concepts and Techniques
2
Analyzing a Cyber Attack
3
Starter
§Your phone freezes 📱
§Ads pop up everywhere 😡
§Battery drains fast 🔋
§Messages are sent without you 😱”
4
welcome to the world of Cyber Attack !!!!
5
Types of Malware
By
6
Malware
Malware | Fun Explanation |
|---|---|
🕵️ Spyware | “The Stalker – watches everything you do” |
📢 Adware | “The Pop-Up Monster – never shuts up” |
🎭 Trojan | “The Fake Friend – looks safe, is evil” |
💰 Ransomware | “The Kidnapper – pay or lose your files” |
🧬 Virus | “Needs a host to spread” |
🐛 Worm | “Spreads fast without permission” |
🔓 Backdoor | “Secret entrance for hackers” |
7
Cybercriminals:
•use many different types of malicious software, or malware, to carry out their activities. The use of malware is any code that can steal data, bypass access controls, or cause harm to or compromise a system. Knowing the different types and how they spread is key to containing and removing them.
8
spyware
•Spyware monitors your online activity and can log every key you press on your keyboard and capture almost any of your data, including sensitive personal information such as your online banking details. Its design is to track and spy on you. Spyware does this by modifying the security settings on your devices.
9
Multiple Choice
Which type of malware is designed to secretly monitor user activity and capture sensitive information such as keystrokes and banking details?
adware
spyware
virus
worm
10
Adware
•Often, adware installs with some software versions, and its design is to automatically deliver advertisements to a user, most often on a web browser. You know it when you see it! It’s hard to ignore when facing constant pop-up ads on your screen.
•It is common for adware to come with spyware.
11
Multiple Choice
What is the primary purpose of adware?
Encrypt files for ransom
Gain unauthorized system access
Display unwanted advertisements
Delete system files
12
Backdoor
•This malware gains unauthorized access by bypassing the normal authentication procedures to access a system. As a result, hackers can access resources within an application and issue remote system commands.
•A backdoor works in the background and is difficult to detect.
13
Multiple Choice
Which malware bypasses normal authentication procedures to give attackers remote access to a system?
Trojan Horse
Rootkit
Backdoor
Scareware
14
Ransomware
•The design of this malware is to hold a computer system or the data it contains captive until it makes a payment. Ransomware usually encrypts your information so you can't access it.
•Some versions of ransomware can take advantage of specific system vulnerabilities to lock it down. Ransomware is often spread through phishing emails that encourage you to download a malicious attachment or through a software vulnerability.
15
Multiple Choice
Ransomware typically does which of the following?
Displays fake security warnings
Encrypts data and demands payment
Replicates itself across networks
Shows pop-up advertisements
16
scareware
•This type of malware uses 'scare' tactics to trick you into taking a specific action. Scareware mainly consists of operating system-style windows that warn you that your system is at risk and needs to run a specific program to return to normal operation.
•If you agree to execute the specific program, your system will become infected with malware.
17
Multiple Choice
Which malware uses fake security alerts to trick users into installing malicious software?
Virus
Worm
Scareware
Spyware
18
Rootkit
•The design of this malware is to modify the operating system to create a backdoor, which attackers can then use to access your computer remotely. Most rootkits use software vulnerabilities to access resources that shouldn’t be accessible (privilege escalation) and modify system files.
•Rootkits can also modify system forensics and monitoring tools, making them very hard to detect. If a rootkit infected a computer, wipe the computer and reinstall any required software.
19
Multiple Choice
What makes rootkits particularly difficult to detect?
They spread only via email
They require user interaction
They modify the operating system and security tools
They display visible pop-ups
20
Viruses
•A virus is a computer program that, when executed, replicates and attaches itself to other executable files, such as a document, by inserting its code. Most viruses require end-user interaction to initiate activation and can act on a specific date or time.
•Viruses, such as those that display a funny image, can be relatively harmless. Or they can be destructive, such as those that modify or delete data.
•Viruses can also be programmed to mutate to avoid detection. USB drives, optical disks, network shares, or email spreads most viruses.
21
Multiple Choice
Which statement best describes a computer virus?
It spreads automatically without user action
It disguises itself as legitimate software
It attaches itself to executable files and replicates
It only affects network devices
22
Trojan horse
•This malware carries out malicious operations by masking its true intent. It appears legitimate but is very dangerous. Trojans exploit your user privileges, and image files are where you find them, audio files or games.
•Unlike viruses, Trojans do not self-replicate but act as decoys to sneak malicious software past unsuspecting users.
23
Multiple Choice
How is a Trojan Horse different from a virus?
Trojans self-replicate, viruses do not
Trojans disguise themselves as legitimate software
Trojans only infect hardware
Trojans cannot cause damage
24
Worms
•This type of malware replicates itself to spread from one computer to another. Unlike a virus, which requires a host program, worms can run alone. Other than the initial infection of the host, they do not require user participation and can spread very quickly over the network.
•Worms share similar patterns: They exploit system vulnerabilities, have a way to propagate themselves, and all contain malicious code (payload) to cause damage to computer systems or networks.
•Worms are responsible for some of the most devastating attacks on the Internet. In 2001, the Code Red worm infected over 300,000 servers in just 19 hours.
25
Multiple Choice
Which type of malware can spread across networks without user interaction?
Virus
Trojan horse
Worm
Adware
26
"Malware always leaves clues"
27
Symptoms of Malware
Regardless of the type of malware that infects a system, you can look out for some common symptoms. These include:
•an increase in central processing unit (CPU) usage, which slows down your device
•your computer freezing or crashing often
•a decrease in your web browsing speed
•unexplainable problems with your network connections
•modified or deleted files
•the presence of unknown files, programs, or desktop icons
•unknown processes running
•programs turning off or reconfiguring themselves
sending emails without your knowledge or consent
28
Multiple Choice
Which of the following is a common symptom of malware infection?
Faster internet speed
Improved system performance
Unknown programs or processes running
Increased storage space
29
Methods of infiltration
Replace with sub-header
Replace this with your body text. Duplicate this text as many times as you would like. All provided templates can be reused multiple times. Wish you a good day.
Happy teaching!
30
social Engineering
•Social engineering is manipulating people into performing actions or divulging confidential information. Social engineers often rely on people’s willingness to be helpful but also prey on their weaknesses.
31
Social Engineering
Pretexting
•This is when an attacker calls an individual and lies to them to gain access to confidential data.
For example, pretending to need a person’s personal or financial data to confirm their identity
32
Social Engineering
Tailgating
•This is when an attacker quickly follows an authorized person into a secure, physical location.
Happy teaching!
33
Social Engineering
Something for something (quid pro quo)
•This is when an attacker requests personal information from someone in exchange for something, like a gift.
34
Multiple Choice
What is social engineering?
Using software to break into systems
Manipulating people to give information or perform actions
Sending viruses through email
Hacking computers using codes
35
Multiple Choice
Why are social engineers often successful?
They use very advanced computers
They attack only weak networks
They take advantage of people’s trust and willingness to help
They always use malware
36
Multiple Choice
An attacker pretends to be an IT staff member and urgently asks for login details. What type of attack is this?
Tailgating
Quid pro quo
Pretexting
DoS
37
Multiple Choice
Which social engineering technique involves following an authorized person into a secure area?
Pretexting
Tailgating
Phishing
Password spraying
38
Multiple Choice
An attacker offers a free gift in exchange for personal information. This is called:
Pretexting
Tailgating
Quid pro quo
Dictionary attack
39
Dos Vs DDos
one student blocks the door -> Dos
Many students block the door -> DDos
40
Denial-of-Service(DoS)
Denial-of-Service (DoS) A Denial-of-Service (DoS) attack happens when a computer, website, or app gets too many requests at once and cannot handle them.
Result:
Website becomes slow
App freezes
Service crashes
41
Distributed Dos
A Distributed DoS (DDoS) attack is similar to a DoS attack but originates from multiple coordinated sources. For example:
•A Distributed Denial-of-Service (DDoS) attack is when many computers attack one website or system at the same time, causing it to crash.
42
Distributed Dos
Hackers infect normal computers by:
Unsafe websites
Infected emails
Fake downloads
Those infected computers become:
🧟 ZOMBIES (they still look normal!)
43
Multiple Choice
What is a Denial-of-Service (DoS) attack?
Stealing passwords from users
Blocking network access by overwhelming it
Modifying website content
Sending fake emails
44
Multiple Choice
What is the main difference between DoS and DDoS attacks?
DDoS uses passwords; DoS does not
DoS uses malware; DDoS does not
DDoS comes from multiple sources, DoS from one
DoS is illegal, DDoS is legal
45
"Hackers control thousands of computers like zombies
46
Botnet
•A botnet is a zombie army controlled by one hacker.
A bot computer is a normal computer that becomes infected after visiting unsafe websites or opening infected emails or files.
A botnet is a large group of these infected computers (bots) connected through the internet and secretly controlled by hackers.
Botnets can contain thousands or even millions of computers.
47
Multiple Choice
What is a botnet?
A secure computer network
A group of computers controlled by an attacker
A type of antivirus software
A cloud storage system
48
Man-in-the-Middle
" Someone secretly listens to your message in between
49
On-Path attacks
•On-path attacks happen when an attacker secretly places themselves between two devices (like your browser and a website).
The attacker can listen to, change, or steal information being sent.
This type of attack is called a Man-in-the-Middle (MitM) or Man-in-the-Mobile attack.
In a MitM attack, the attacker takes control without the user knowing.
50
SEO Poisoning
" You Google homework help...
First result is fake and dangerous "
51
SEO Poisoning
•SEO (Search Engine Optimization) is normally used to help websites appear higher in search results.
Search engines like Google show results based on how relevant a website is to what you search.
SEO poisoning happens when attackers misuse SEO techniques to push malicious websites to the top of search results.
52
Password Attacks
write passwords:
123456
password
A7#pL!9
Which one would hackers love?
53
Password Attacks
Password Spraying
Password spraying is when a hacker tries one common password (like Password123) on many different accounts.
Then they try another common password (like qwerty) on those accounts.
This method avoids account lockouts, so it is harder to detect.
Dictionary Attack
A dictionary attack is when a hacker tries many different passwords from a dictionary or common password liston one account.
The goal is to guess the correct password by testing common words people often use.
54
Password Attack
Brute-force = try all password combinations
Rainbow attack = match password hashes using tables
Traffic interception = steal passwords while they are being sent
55
Multiple Choice
What type of attack involves secretly intercepting communication between two devices?
DoS
SEO poisoning
Man-in-the-middle (MitM)
Tailgating
56
Multiple Choice
What is SEO poisoning?
Improving website ranking legally
Using search engines to spread malware
Encrypting website data
Blocking search results
57
Multiple Choice
What is password spraying?
Trying one password on one account many times
Trying many passwords on one account
Trying common passwords across many accounts
Stealing passwords from browsers
58
Security Vulnerability and Exploits
59
- Name of Author
" Even Strong systems fail if there's a crack. "
60
Hardware Vulnerabilities/Meltdown and Spectre
Hardware vulnerabilities are weaknesses caused by flaws in the design of physical computer parts.
One example is RAM (memory), which is made of many tiny components called capacitors.
These capacitors are placed very close together.
Because they are so close, changing one capacitor can accidentally affect nearby capacitors.
Attackers can take advantage of this behavior to access or change data they should not be able to.
61
Software Vulnerabilities
•Errors in the operating system or application code usually introduce software vulnerabilities.
Most software security vulnerabilities fall into several main categories
Buffer Overflow:
Non-validated input:
Race conditions:
Weaknesses in security practices:
Access Control problems:
62
Software Updates
•The goal of software updates is to stay current and avoid exploiting vulnerabilities. Microsoft, Apple, and other operating system producers release patches and updates daily. The companies or organizations responsible for them update applications such as web browsers, mobile apps, and web servers.
63
The cybersecurity Landscape
64
Cryptocurrency
“Digital money locked by math 🔐”
•Cryptocurrency is digital money used to buy goods and services, using strong encryption techniques to secure online transactions. Banks, governments, and even companies like Microsoft and AT&T are very aware of its importance and are jumping on the cryptocurrency bandwagon!
65
Cryptojacking
•Cryptojacking is an emerging threat that hides on a user's computer, mobile phone, tablet, laptop, or server, using that machine's resources to 'mine' cryptocurrencies without the user's consent or knowledge.
66
Multiple Choice
What is cryptocurrency primarily used for?
Storing physical cash
Buying goods and services digitally
Replacing all government-issued money
Running computer operating systems
67
Multiple Choice
What is cryptojacking?
Legal cryptocurrency mining
A method of encrypting wallets
Unauthorized use of devices to mine cryptocurrency
A type of digital payment
Module 2: Attacks, Concepts and Techniques
Show answer
Auto Play
Slide 1 / 67
SLIDE
Similar Resources on Wayground
65 questions
Population Dynamics- Pre-IB Biology
Lesson
•
9th Grade
58 questions
Secondary Storage
Lesson
•
9th Grade
62 questions
Innovación e idea emprendedora
Lesson
•
9th Grade
61 questions
Error Intervals
Lesson
•
9th Grade
62 questions
Solving Simple Inequalities
Lesson
•
9th Grade
61 questions
9th Vocab Unit 4 - Slides & Quiz
Lesson
•
9th Grade
60 questions
Present, Future, Past Continuous
Lesson
•
9th Grade
58 questions
Ecology
Lesson
•
9th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade