Cyber Security & Skills #BeMore Cyber Security V E-Safety • Cyber Security is the protection of systems, networks and data in cyber space • E-Safety is how we protect ourselves from unwanted contact, content and communication in cyberspace, its just one element of cyber security CYBER QUIZ • In pairs / teams answer the following questions • You can consult with your team members but not opposition • Only first answers will be accepted Question 1 • What is the name of this Cyber Threat? Question 2 • What is the name of this this Cyber Threat ? Question 3 • What is the name of this Cyber Threat? Question 4 • What is the name of this Cyber Threat? Question 5 • What is the name of this Cyber Threat? Question 6 • What is the name of this Cyber Threat? Question 7 • What is the name of this Cyber Threat? Question 8 • What is the name of this Cyber Threat? Question 9 • Name 2 ways that you can stop yourself becoming the victim of a cyber crime Question 10 • What are the average earnings of a Cyber Security Professional ? Question 1 - What is the name of this Cyber Threat? • Trojan • Malicious Software (MALWARE !!) • Disguised as something normal you want but carries out harmful functions without victims knowledge • Victims are tricked into downloading it • Once on a device it can delete / block / change / copy data / disrupt the performance Question 2 - What is the name of this this Cyber Threat ? • Virus • Will embed itself in existing software • runs automatically when you open certain types of files Question 3 - What is the name of this Cyber Threat? • Worms • Malware that self-replicates and infects a whole network of connected computers • Use communication between computers to spread Question 4 - What is the name of this this Cyber Threat ? • Botnet • A collection of infected computers called Zombies that are remotely controlled by a hacker • The hacker can share or sell access to control the botnet, allowing others to use it for malicious purposes • Can be used to spread spam, commit a DDoS (Distributed Denial of Service) attack Question 5 - What is the name of this Cyber Threat? • Phishing • Tries to hook the victim into doing something they wouldn’t normally do – give a cyber criminal sensitive information • Pretend to be from trustworthy sources • May contain links to websites that are infected with malware Question 6 - What is the name of this Cyber Threat? • Ransomware • Malware that denies you access to your files or computer until you pay a ransom to release them • Relatively new but currently prolific Consequences Question 7 - What is the name of this Cyber Threat? • A hacker • A person who uses computers to gain unauthorised access to data or networks Types of Hackers • Cracker • Hacktivist • Script Kiddie • Cyber Terrorist • Corporate Cyber Spy • Unethical Employee / Student • Ethical hacker • Penetration Tester Computer Misuse Law • Unauthorised Access to computer material – up to 5 years in prison • Unauthorised Acts with intent to impair the operation of a computer – up to life in prison • Making, supplying or obtaining articles for use in computer misuse act crimes – 2 years in prison Detective: Gamers who commit serious cyber crime often start with thefts in popular online games like World Of Warcraft Dr Jamie Saunders of the National Crime Agency. NCA Choices Video • https://www.youtube.com/watch?v=DjYrxzSe3DU Question 8 - What is the name of this Cyber Threat? • Your Digital Footprint • Often now called Digital Tattoo because you can’t get rid of it easily and so it stays with you for life Would you want a future employer to see these ?? Cifas data reveals identity fraud victims aged 30 and under up by 52% CIFAS Coffee to go Video • https://www.youtube.com/watch?v=_YRs28yBYuI Question 9 - Name 2 ways that you can stop yourself becoming the victim of a cyber crime offence Online Safety Top 10 Tips Make sure your computer has up-to-date security software, switched on Always download the latest operating system and browser updates http://www.whatbrowseramiusing.co/ Don’t reveal personal information on social networking sites Regularly backup the data on your computer and smartphone / tablet Don’t get caught by phishing or vishing Make sure your wireless network is secure at all times. THINK before you Click the link !!! Use strong passwords What is your password Video • https://www.youtube.com/watch?v=opRMrEfAIiI When shopping, paying or banking on-line, always make sure the website is secure. Beware of Portable devices (USB’s, external hard drives) Question 10 - What are the average earnings of a Cyber Security Professional ? http://www.crest-approved.org/wpcontent/uploads/DigitalDefenders.pdf https://www.thetechpartnership.com http://www.inspiredcareers.org • https://cybersecuritychallenge.org.uk/ • Cyber Centurion • Cyber Games • Extended Project Qualification (EPQ) in cyber security • Cyber Security Novice Toolkit Countdown to Chaos • Designed for 11-14 year olds, this exciting resource places students in role of the Government’s counter-security chief. Through a mix of news flashes, instant messaging and challenges, students will be the decision-maker to direct, and stop the hacker. • It’s flexible, and can be completed either as a class-based activity or by providing students with individual access so they can work on it at home or in an after-school club. • Played out in four ‘acts’, the game can be completed in half a day or over a series of lessons. https://learning.thetechpartnership.com/ Thank You Cath Elvey [email protected] 07399 592298 #BeMore
© Copyright 2026 Paperzz