Search Header Logo
Yr 8 - Network Threats (Systems Security)

Yr 8 - Network Threats (Systems Security)

Assessment

Presentation

Computers

8th - 11th Grade

Easy

Created by

Nishaaz Issak

Used 12+ times

FREE Resource

23 Slides • 10 Questions

1

media

2

Yr 8 - Network Threats (Systems Security)

Teacher - Please open the Lesson PPT too for starters / plenaries as well as links to videos

(embedded media only available on paid subscription for Quizziz).

3

Network Threats

Social Engineering

Commonly involves tricking users into breaking normal security procedures over phone, email or in person.

Some text here about the topic of discussion

media

4

Fill in the Blank

Social Engineering...

Commonly involves ______ users into breaking security rules over the phone, via email or in person (e.g. clicking on an email attachment)

5

Open Ended

In your own words, what is Social Engineering?

6

Network Threats

Poor Network Policies

Users are usually the weakest link i.e. humans. Humans make mistakes e.g. using software they shouldn't, opening emails with attachments and turning off firewalls etc.

Some text here about the topic of discussion

media

7

Multiple Choice

Poor Network Policies.

What is usually the weakest link in an organisation?

1

Old Software or Hardware that's easy to hack.

2

Anti-virus software that isn't updated.

3

An old technician who's not trained fully.

4

The staff that work there - they make mistakes!

5

Poor firewall settings - it lets traffic in it shouldn't!

8

Network Threats

Data Theft

Data travels across networks in packets

Packets can be intercepted.

Data can also be intercepted physically, for example portable hard drives and other external hardware can be stolen

Some text here about the topic of discussion

media

9

Multiple Choice

Data Theft...

1

A hacker may try different password until access to an account is granted.

2

Users are tricked into giving personal information.

3

Attempts to flood a website with data requests.

4

Tricking people to download malware or giving information (usually via email)

5

Stealing data that is being transmitted or held.

10

Multiple Choice

Data Theft.

What could prevent or resolve data theft?

1

Firewall.

2

Anti-virus software.

3

Fully Trained Staff

4

Encryption

5

Not using a Network i.e. using a Portable Hard Drive or a USB Memory Stick.

11

Network Threats

Malware

Malicious software designed to cause harm to a network or computer system

Attaches itself to programs or files on a computer or server

Can affect all components of an operating system

Some text here about the topic of discussion

media

12

Network

Threats

DOS Attack

A DoS attack attempts to flood a website server with an overwhelming number of data requests to crash or disrupt network sites - its a bit like being poked constantly by 1000 people at the same time! It distracts you!

Some text here about the topic of discussion

media

13

Network Threats

DOS Attack - also known as DDOS

Tell the person next to you, what's a DOS (DDOS) attack ​

Some text here about the topic of discussion

media

14

Multiple Choice

DOS attack...

1

A hacker may try different password until access to an account is granted.

2

Users are tricked into giving personal information.

3

Attempts to flood a website with data requests.

4

Tricking people to download malware or giving information (usually via email)

5

Stealing data that is being transmitted or held.

15

Open Ended

In your own words, what is a DOS attack?

16

Network Threats

Brute Force

In a brute force attack, a hacker may go through a list of different passwords until access to an account is gained

Some text here about the topic of discussion

media

17

Plenary for Lesson 1

A bit of fun...

Use the internet to find one image in relation to each of hte following:

​Brute Force, Malware, Social Engineering, Data Theft & DOS attack.

(make it like a collage on one powerpoint slide ---> )​

Some text here about the topic of discussion

media

18

media

19

media

20

Multiple Choice

Phishing...

1

A hacker may try different password until access to an account is granted.

2

Users are tricked into giving personal information.

3

Attempts to flood a website with data requests.

4

Tricking people to download malware or giving information (usually via email)

5

Stealing data that is being transmitted or held.

21

Open Ended

Phishing Involves...

22

media

23

Multiple Choice

Brute Force...

1

A hacker may try different password until access to an account is granted.

2

Users are tricked into giving personal information.

3

Attempts to flood a website with data requests.

4

Tricking people via email

5

Stealing data that is being transmitted or held.

24

media

25

media

26

media

27

media

Go to Lesson PPT for URL to video.

28

media

29

media
media

30

media

31

media

Go to Lesson PPT for URL to video.

32

media

33

Plenary for Lesson 2

A bit of fun... (again!)

You're going to write a 30 second rap (or poem if you must!) about Network Threats and their prevention.

You're going to write it first and submit this via an assignment on MS Teams.​

Some text here about the topic of discussion

media

Keyword to help you...

  • Spyware

  • Botnet

  • SQL Injection​

  • Brute Force

  • Malware

  • Encryption

  • Firewall

  • Anti-virus

  • Tricked​

media

Show answer

Auto Play

Slide 1 / 33

SLIDE