Cyber Security Presentation and Quiz

Cyber Security & Skills
#BeMore
Cyber Security V E-Safety
• Cyber Security is the protection of systems, networks and
data in cyber space
• E-Safety is how we protect ourselves from unwanted contact,
content and communication in cyberspace, its just one
element of cyber security
CYBER QUIZ
• In pairs / teams answer the following questions
• You can consult with your team members but not opposition
• Only first answers will be accepted
Question 1
• What is the name of this Cyber Threat?
Question 2
• What is the name of this this Cyber Threat ?
Question 3
• What is the name of this Cyber Threat?
Question 4
• What is the name of this Cyber Threat?
Question 5
• What is the name of this Cyber Threat?
Question 6
• What is the name of this Cyber Threat?
Question 7
• What is the name of this Cyber Threat?
Question 8
• What is the name of this Cyber Threat?
Question 9
• Name 2 ways that you can stop yourself becoming the victim
of a cyber crime
Question 10
• What are the average earnings of a Cyber Security
Professional ?
Question 1 - What is the name of this Cyber Threat?
• Trojan
• Malicious Software (MALWARE !!)
• Disguised as something normal you want but carries out
harmful functions without victims knowledge
• Victims are tricked into downloading it
• Once on a device it can delete / block / change / copy data /
disrupt the performance
Question 2 - What is the name of this this Cyber Threat ?
• Virus
• Will embed itself in existing software
• runs automatically when you open certain
types of files
Question 3 - What is the name of this Cyber Threat?
• Worms
• Malware that self-replicates and infects a
whole network of connected computers
• Use communication between computers
to spread
Question 4 - What is the name of this this Cyber
Threat ?
• Botnet
• A collection of infected computers called
Zombies that are remotely controlled by a hacker
• The hacker can share or sell access to control the botnet,
allowing others to use it for malicious purposes
• Can be used to spread spam, commit a DDoS (Distributed
Denial of Service) attack
Question 5 - What is the name of this Cyber Threat?
• Phishing
• Tries to hook the victim into doing something
they wouldn’t normally do – give a cyber criminal
sensitive information
• Pretend to be from trustworthy sources
• May contain links to websites that are infected with
malware
Question 6 - What is the name of this Cyber Threat?
• Ransomware
• Malware that denies you access to your files or
computer until you pay a ransom to release them
• Relatively new but currently prolific
Consequences
Question 7 - What is the name of this Cyber Threat?
• A hacker
• A person who uses computers to gain
unauthorised access to data or networks
Types of Hackers
• Cracker
• Hacktivist
• Script Kiddie
• Cyber Terrorist
• Corporate Cyber Spy
• Unethical Employee /
Student
• Ethical hacker
• Penetration Tester
Computer Misuse Law
• Unauthorised Access to
computer material – up to 5
years in prison
• Unauthorised Acts with intent to
impair the operation of a
computer – up to life in prison
• Making, supplying or obtaining
articles for use in computer
misuse act crimes – 2 years in
prison
Detective: Gamers who commit serious cyber
crime often start with thefts in popular online
games like World Of Warcraft
Dr Jamie Saunders of the National Crime Agency.
NCA Choices Video
• https://www.youtube.com/watch?v=DjYrxzSe3DU
Question 8 - What is the name of this Cyber Threat?
• Your Digital Footprint
• Often now called Digital Tattoo because you can’t
get rid of it easily and so it stays with you for life
Would you want a future employer to see these ??
Cifas data reveals identity fraud victims aged
30 and under up by 52%
CIFAS Coffee to go Video
• https://www.youtube.com/watch?v=_YRs28yBYuI
Question 9 - Name 2 ways that you can stop yourself
becoming the victim of a cyber crime offence
Online Safety Top 10 Tips
Make sure your computer has up-to-date
security software, switched on
Always download the latest operating
system and browser updates
http://www.whatbrowseramiusing.co/
Don’t reveal personal information on
social networking sites
Regularly backup the data on your
computer and smartphone / tablet
Don’t get caught by phishing or vishing
Make sure your wireless network is secure
at all times.
THINK before you Click the link !!!
Use strong passwords
What is your password Video
• https://www.youtube.com/watch?v=opRMrEfAIiI
When shopping, paying or banking
on-line, always make sure the website is
secure.
Beware of Portable devices
(USB’s, external hard drives)
Question 10 - What are the average earnings of a
Cyber Security Professional ?
http://www.crest-approved.org/wpcontent/uploads/DigitalDefenders.pdf
https://www.thetechpartnership.com
http://www.inspiredcareers.org
• https://cybersecuritychallenge.org.uk/
• Cyber Centurion
• Cyber Games
• Extended Project Qualification (EPQ) in cyber security
• Cyber Security Novice Toolkit
Countdown to Chaos
• Designed for 11-14 year olds, this exciting resource places students in role of
the Government’s counter-security chief. Through a mix of news flashes,
instant messaging and challenges, students will be the decision-maker to
direct, and stop the hacker.
• It’s flexible, and can be completed either as a class-based activity or by
providing students with individual access so they can work on it at home or
in an after-school club.
• Played out in four ‘acts’, the game can be completed in half a day or over a
series of lessons.
https://learning.thetechpartnership.com/
Thank You
Cath Elvey
[email protected]
07399 592298
#BeMore