Computing Creative Design and Innovation Grade 10 - :: Networks and The Internet

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 54

Computing Creative design and innovation

Grade 10 – Gen. – Term 1


2023-2024

Chapter 1: Networks and the internet


CCDI – Term 1

Week Unit Lessons 1+2 Pages


Student Book 12 - 18
2 1 Activity Book 10 - 11
Section 1:
Network threats and implementation

Lubna Al Meshaiei -- CCDI teacher -- Um Kolthoom C3-Al Ain


2023-2024
CCDI – Term 1

app.classkick.com
LMS: Chapter 1
CCDI – Term 1

2023-2024
Chapter 1: Networks and the internet
2023-2024

Last week
Section 1: Network threats and implementation
CCDI – Term 1
• What is cybersecurity?
2023-2024
Is a process to protect individuals,
organizations and governments from
CCDI – Term 1

digital attacks.

• Data needs to be protected at


three levels:
1. Personal level
2. Organizational level
3. Government level
• What is a personal data?
2023-2024
Is any information that is used to identify a person.
CCDI – Term 1

• From where can personal data collected?

 Smart devices
 Bank’s website or mobile banking app
 Wearable technology such as smartwatches
 Social media
• Social media knows you better than anyone. Why?
2023-2024

Because there is no privacy, It knows your: friends,


CCDI – Term 1

interests, movements/travels

• A persona
_________is a fictional
character created
based on research data
collection.
• Who is identity thief ?
2023-2024 Is a cybercriminals can steal a person's identity and
ruin their life. (medical benefits and medical
insurance, steal money or take loans)
CCDI – Term 1
• What types of organizations data?
2023-2024 1.Transactional (Bank account data crediting/debiting )
2.Intellectual (Company’s patents )
3.Financial (Employee’s salary details )
CCDI – Term 1

• What types of governments data?


1.Government employees
2.Citizens
3.Vendors
2023-2024

LMS: Chapter 1
CCDI – Term 1

Chapter1 - Week 1 - Review

Award in LMS
2023-2024
CCDI – Term 1

1. What is the primary goal of cybersecurity?


A. Promoting digital attacks
B. Protecting data from cybercriminals
C. Collecting personal information
D. Enhancing network systems
2023-2024

2. What are the three levels at which data needs


CCDI – Term 1

protection?
A) Personal, social, international
B) National, local, individual
C) Personal, organizational, government
D) Social, technological, economic
2023-2024

3. What is identity theft in the context of


cybersecurity?
CCDI – Term 1

A) Creating fictional personas for research


B) Collecting data for social media profiles
C) Stealing someone's medical benefits
D) Developing malicious software
2023-2024

4. What term refers to activities aimed at stealing or


damaging data and disrupting digital life?
CCDI – Term 1

A) Digital engagement
B) Cybersecurity promotion
C) Malicious activities
D) Identity management
2023-2024

5. ___________________ is a process
to protect individuals, organizations,
CCDI – Term 1

and governments from digital attacks.


A) Malware
B) Cybersecurity
C) Network Security
D) Data security
2023-2024

6. Cybersecurity threats are malicious activities by an


CCDI – Term 1

individual or organization to __________ or


_________ the data.
A) add, take
B) edit, modify
C) protect, save
D) steal, damage
Computing Creative design and innovation
2023-2024
Grade 10 – Gen. – Term 1

Chapter 1: Networks and the internet


CCDI – Term 1

Week Unit Lessons 1+2 Pages


Student Book 12 - 18
2 1 Activity Book 10 - 11
Section 1:
Network threats and implementation

Lubna Al Meshaiei -- CCDI teacher -- Um Kolthoom C3-Al Ain


Lesson

2023-2024

Outcome keywords Title


CCDI – Term 1

Lessons Activities

EXIT
Assess yourself TICKET

My Learning
Chapter 1: Networks and the internet
2023-2024 Section 1: Network threats and implementation
Learning Explain the types of cybersecurity threats
CCDI – Term 1

outcomes

Key vocabulary
Types of cybersecurity threats
2023-2024

Cybersecurity threats are malicious activities by an


individual or organisation to steal or damage the
CCDI – Term 1

data, gain access to a network system, and disrupt


digital life. The following are the threats available
today:

• Malware
• Social engineering
• Denial-of-service DoS
• Wi-Fi password cracking
Types of cybersecurity threats
Malware
2023-2024

Malware is software written to harm or cause issues with a computer. This is also
called malicious code. This code comes in several forms and either harm or steals
CCDI – Term 1

data from a computer system. Cybercriminals use many different types of


malware or malicious software to carry out their activities.

Types of malware:

Rootkit
Types of malware:

2023-2024
CCDI – Term 1

A computer can Infects a Are often found replicates itself to designed to


become infected computer when in image files, spread from one deliver
with spyware in executed and audio files or computer to advertisements
many methods . then replicates games. Trojans another quickly to a user on a
Ex. downloading itself to pass to do not self- over the network web browser
software from an another replicate but without user automatically. It
unreliable source. computer. Most carry out participation. causes pop-up
Spyware viruses are malicious ads on the screen
Monitors online spread by USB operations by and is sometimes
activity and drives, optical hiding their difficult to close.
captures all the disks, network purpose. It is common for
personal data like shares or email. adware to come
passwords or with spyware.
bank details
Types of malware:

2023-2024
CCDI – Term 1

Hijacks the data on a Works in the background uses ‘scare’ tactics to like backdoor malware
computer system by of a computer system and take a specific action. and is designed to modify
encrypting it and then is difficult to detect. Usually consists fake the operating system.
demands the owners Backdoor malware gains windows that pop up to Hard to detect as the
to pay money for the unauthorized access to a warn the user that the attackers gain access to
data to be decrypted. system by bypassing the system is at risk and remote resources to
Ransomware is often normal authentication needs to run a specific modify the system files.
spread through procedures. After a program. If the user Therefore, a computer
phishing emails backdoor attack, hackers gets scared and accepts, infected with rootkit
can remotely access the the computer system malware is completed
resources through system will become infected. wiped, and software
commands. programs are reinstalled
Slide 4 in
Adware Virus Worms Spyware
2023-2024 Identify the malware used in the following cyberattacks. Ransomware
1. Malware designed to track online activity and capture data_________________
CCDI – Term 1

2. Software that automatically delivers advertisements____________________

3. Malware that holds a computer system captive until payment is made to the
attacker___________________

4. Malicious code attached to genuine programs and usually spreads by USB drives,
emails or network shares________________________

5. Malicious code that replicates itself independently by exploiting vulnerabilities in


networks__________________
https://wordwall.net/resource/
21883491
2023-2024
CCDI – Term 1

The link is in
Teams, in
the chat
area
Types of cybersecurity threats

2023-2024

Cybersecurity threats are malicious activities by an


individual or organisation to steal or damage the
CCDI – Term 1

data, gain access to a network system, and disrupt


digital life. The following are the threats available
today:

• Malware

• Social engineering
• Denial-of-service DoS
• Wi-Fi password cracking
Types of cybersecurity threats
Social engineering
2023-2024

For example, an attacker will call an authorized employee with an urgent problem
that requires immediate network access. The attacker will try using techniques to
CCDI – Term 1

gain the employee's trust and tries to access confidential data.

Phishing is a common social engineering attack. The


attackers contact a target through email, phone, or text
message to click a link. This link will redirect the targets
to fraudulent websites to provide confidential data like
personal information, banking and credit card
information, usernames, and passwords.
Types of cybersecurity threats
Denial-of-Service DOS
2023-2024

Are a type of network attack that results in some sort of


interruption of network service to users, devices, or
CCDI – Term 1

applications.
An overwhelming quantity of traffic is a type of DoS attack in a network where
an enormous amount of data is sent to the host at a rate it cannot handle. This
kind of attack causes a slowdown in transmission or response or cause a device
or service to crash.
Types of cybersecurity threats
Denial-of-Service DOS
2023-2024
CCDI – Term 1

A Distributed DoS (DDoS) attack is similar to a DoS attack but


originates from multiple, coordinated sources.
For example, an attacker builds a network (botnet) of infected
hosts called zombies controlled by handler systems. The zombie
computers will constantly scan and infect more hosts, creating
more and more zombies. When needed, the hacker will instruct
the handler systems to make the botnet of zombies carry out a
DDoS attack.

A bot computer is typically infected by visiting an unsafe website or opening an


infected email attachment or media file. A botnet is a group of bots in hundreds of
thousands of bots connected through the internet. Cyber attackers control a
botnet through system commands.
Types of cybersecurity threats
Denial-of-Service DOS
2023-2024
CCDI – Term 1

Also referred to as a man-in-the-middle (mitm) or man-in-the-mobile (mitmo) attack. This attack


intercepts or modifies communications between two devices, such as a web browser and a web
server, to collect information from the devices
A mitm attack happens when a cybercriminal takes
control of a device and captures users’ information
without the user’s knowledge.

A mitmo is a type of attack used to take control over a


user’s mobile device.

Attackers use popular search terms and use SEO to push malicious sites to higher up the ranks of
search results. This technique is called Search Engine Optimization (SEO) poisoning
https://wordwall.net/resource/2
1884067
2023-2024
CCDI – Term 1

The link is in
Teams, in
the chat
area
2023-2024 Slide 5 in
CCDI – Term 1

MitM MitMo
Cyber criminals take control of device Cyber criminals' control off
and captures data users' knowledge user mobile device

They steal financial information They steal confidential data


from mobile
Types of cybersecurity threats
Wi-Fi password cracking
2023-2024

One of the most common methods of authenticating to a website is by entering


a username and password. As a result, revealing your password is a simple
CCDI – Term 1

way for cybercriminals to gain access to your most sensitive information.

There are different kinds of password attacks, as follows:


• Password spraying
• Dictionary attacks
• Brute-force attacks
• Rainbow attacks
• Traffic interception
Types of cybersecurity threats
Wi-Fi password cracking
2023-2024

Password spraying access to a Traffic interception


system by ‘spraying’ a few By intercepting communications,
other humans and machines can
CCDI – Term 1

commonly used passwords


across many accounts. easily read plain text or unsecured
passwords
Dictionary attacks
Access to a password-protected Rainbow attacks
account, by systematically Passwords are stored as numerical
trying every word in a data rather than plain text in a
dictionary or a list of commonly computer system. A rainbow table
used words as a password. is a large dictionary of passwords
and their numerical values.

Brute-force attacks
most basic and widely used method of gaining access to a password-protected site,
involve trying every possible combination of letters, numbers, and symbols in the
password space until they get it right
https://wordwall.net/resource/
21881588
2023-2024
CCDI – Term 1

The link is in
Teams, in
the chat
area
2023-2024
CCDI – Term 1

Slide 6 in
Classkick
b. Consider the passwords given in the table below. Order the
2023-2024 passwords from the highest complexity to the lowest. The
complexity here is measured by the time a hacker requires to
know the correct password using a brute-force attack to lowest.
CCDI – Term 1

Note that ‘4’ being the highest amount of time.

The rank
Hello123 1
Fj43jtj345 3
Slide 6 in
Pass@word#123$ 4
123Password 2
Summary:
2023-2024
CCDI – Term 1

• Types of cybersecurity threats


• Malware ( 9 types )
• Social engineering
• Denial-of-service DoS
• Wi-Fi password cracking
Lesson

2023-2024

Outcome keywords Title


CCDI – Term 1

Lessons Activities

EXIT
Assess yourself TICKET

My Learning
2023-2024
LMS: Chapter 1
CCDI – Term 1

Chapter1 - Week 2 - End of lesson

Award in LMS
1. Any software that is written to harm or cause issues to a
2023-2024

computer system is known as ____________.


CCDI – Term 1

A. an application
B. a cybersecurity
C. malware
D. software
2023-2024

2. A (/An) ___________ malware replicates itself and spreads


from one computer to another through the network.
CCDI – Term 1

A. spyware
B. scareware
C. worms
D. trojan horse
2023-2024

3. The ___________ malware delivers advertisements to a user


on a web browser automatically.
CCDI – Term 1

A. adware
B. scareware
C. trojan horse
D. spyware
2023-2024

4.A(/An) ____________ malware aims to encrypt computer


files and ask for money from the owner to recover the data.
CCDI – Term 1

A. backdoor
B. scareware
C. spyware
D. ransomware
5.The attacker will try using techniques to gain the employee's
2023-2024

trust and try to access confidential data. This is called


CCDI – Term 1

______________

A. malware
B. social media
C. social engineering
D. cybersecurity
2023-2024
6.Is a common social engineering attack. The attackers contact
a target through email, phone, or text message to click
CCDI – Term 1

a link.

A. Phishing
B. Fishing
C. Vishing
D. Virus
7.In this attack, attackers use popular search terms and use SEO
2023-2024

to push malicious sites to higher up the ranks of search results.


CCDI – Term 1

A. Botnet
B. Distributed DoS
C. SEO poisoning
D. Malware
2023-2024 8. Ahmad is using the same password for all his accounts.
This is a good cybersecurity practice.
CCDI – Term 1

A. True B. False

9.Which password from below is the most difficult for a brute-


force cyberattack to find?
A. Password
B. Hi_People@123
C. hi_people@123
D. 123456789
2023-2024

10.A (/An) ______________ cyberattack tries to send a huge


amount of network traffic to the host until it stops working.
CCDI – Term 1

A. denial of service
B. distribution of servers
C. data of server
D. SEO poisoning
Lesson

2023-2024

Outcome keywords Title


CCDI – Term 1

Lessons Activities

EXIT
Assess yourself TICKET

My Learning
My
In LMS
2023-2024
Learning
Scale
CCDI – Term 1

100%
80%
60%
20%
Lesson

2023-2024

Outcome keywords Title


CCDI – Term 1

Lessons Activities

EXIT
Assess yourself TICKET

My Learning
Read the presentation (Week2) in LMS
2023-2024

Finish
CCDI – Term 1

To get full
marks in
effort

Finish
LMS
2023-2024

Thank You
CCDI – Term 1

See you next week!

You might also like