Professional Documents
Culture Documents
G10 Gen
G10 Gen
app.classkick.com
LMS: Chapter 1
CCDI – Term 1
2023-2024
Chapter 1: Networks and the internet
2023-2024
Last week
Section 1: Network threats and implementation
CCDI – Term 1
• What is cybersecurity?
2023-2024
Is a process to protect individuals,
organizations and governments from
CCDI – Term 1
digital attacks.
Smart devices
Bank’s website or mobile banking app
Wearable technology such as smartwatches
Social media
• Social media knows you better than anyone. Why?
2023-2024
interests, movements/travels
• A persona
_________is a fictional
character created
based on research data
collection.
• Who is identity thief ?
2023-2024 Is a cybercriminals can steal a person's identity and
ruin their life. (medical benefits and medical
insurance, steal money or take loans)
CCDI – Term 1
• What types of organizations data?
2023-2024 1.Transactional (Bank account data crediting/debiting )
2.Intellectual (Company’s patents )
3.Financial (Employee’s salary details )
CCDI – Term 1
LMS: Chapter 1
CCDI – Term 1
Award in LMS
2023-2024
CCDI – Term 1
protection?
A) Personal, social, international
B) National, local, individual
C) Personal, organizational, government
D) Social, technological, economic
2023-2024
A) Digital engagement
B) Cybersecurity promotion
C) Malicious activities
D) Identity management
2023-2024
5. ___________________ is a process
to protect individuals, organizations,
CCDI – Term 1
2023-2024
Lessons Activities
EXIT
Assess yourself TICKET
My Learning
Chapter 1: Networks and the internet
2023-2024 Section 1: Network threats and implementation
Learning Explain the types of cybersecurity threats
CCDI – Term 1
outcomes
Key vocabulary
Types of cybersecurity threats
2023-2024
• Malware
• Social engineering
• Denial-of-service DoS
• Wi-Fi password cracking
Types of cybersecurity threats
Malware
2023-2024
Malware is software written to harm or cause issues with a computer. This is also
called malicious code. This code comes in several forms and either harm or steals
CCDI – Term 1
Types of malware:
Rootkit
Types of malware:
2023-2024
CCDI – Term 1
2023-2024
CCDI – Term 1
Hijacks the data on a Works in the background uses ‘scare’ tactics to like backdoor malware
computer system by of a computer system and take a specific action. and is designed to modify
encrypting it and then is difficult to detect. Usually consists fake the operating system.
demands the owners Backdoor malware gains windows that pop up to Hard to detect as the
to pay money for the unauthorized access to a warn the user that the attackers gain access to
data to be decrypted. system by bypassing the system is at risk and remote resources to
Ransomware is often normal authentication needs to run a specific modify the system files.
spread through procedures. After a program. If the user Therefore, a computer
phishing emails backdoor attack, hackers gets scared and accepts, infected with rootkit
can remotely access the the computer system malware is completed
resources through system will become infected. wiped, and software
commands. programs are reinstalled
Slide 4 in
Adware Virus Worms Spyware
2023-2024 Identify the malware used in the following cyberattacks. Ransomware
1. Malware designed to track online activity and capture data_________________
CCDI – Term 1
3. Malware that holds a computer system captive until payment is made to the
attacker___________________
4. Malicious code attached to genuine programs and usually spreads by USB drives,
emails or network shares________________________
The link is in
Teams, in
the chat
area
Types of cybersecurity threats
2023-2024
• Malware
• Social engineering
• Denial-of-service DoS
• Wi-Fi password cracking
Types of cybersecurity threats
Social engineering
2023-2024
For example, an attacker will call an authorized employee with an urgent problem
that requires immediate network access. The attacker will try using techniques to
CCDI – Term 1
applications.
An overwhelming quantity of traffic is a type of DoS attack in a network where
an enormous amount of data is sent to the host at a rate it cannot handle. This
kind of attack causes a slowdown in transmission or response or cause a device
or service to crash.
Types of cybersecurity threats
Denial-of-Service DOS
2023-2024
CCDI – Term 1
Attackers use popular search terms and use SEO to push malicious sites to higher up the ranks of
search results. This technique is called Search Engine Optimization (SEO) poisoning
https://wordwall.net/resource/2
1884067
2023-2024
CCDI – Term 1
The link is in
Teams, in
the chat
area
2023-2024 Slide 5 in
CCDI – Term 1
MitM MitMo
Cyber criminals take control of device Cyber criminals' control off
and captures data users' knowledge user mobile device
Brute-force attacks
most basic and widely used method of gaining access to a password-protected site,
involve trying every possible combination of letters, numbers, and symbols in the
password space until they get it right
https://wordwall.net/resource/
21881588
2023-2024
CCDI – Term 1
The link is in
Teams, in
the chat
area
2023-2024
CCDI – Term 1
Slide 6 in
Classkick
b. Consider the passwords given in the table below. Order the
2023-2024 passwords from the highest complexity to the lowest. The
complexity here is measured by the time a hacker requires to
know the correct password using a brute-force attack to lowest.
CCDI – Term 1
The rank
Hello123 1
Fj43jtj345 3
Slide 6 in
Pass@word#123$ 4
123Password 2
Summary:
2023-2024
CCDI – Term 1
2023-2024
Lessons Activities
EXIT
Assess yourself TICKET
My Learning
2023-2024
LMS: Chapter 1
CCDI – Term 1
Award in LMS
1. Any software that is written to harm or cause issues to a
2023-2024
A. an application
B. a cybersecurity
C. malware
D. software
2023-2024
A. spyware
B. scareware
C. worms
D. trojan horse
2023-2024
A. adware
B. scareware
C. trojan horse
D. spyware
2023-2024
A. backdoor
B. scareware
C. spyware
D. ransomware
5.The attacker will try using techniques to gain the employee's
2023-2024
______________
A. malware
B. social media
C. social engineering
D. cybersecurity
2023-2024
6.Is a common social engineering attack. The attackers contact
a target through email, phone, or text message to click
CCDI – Term 1
a link.
A. Phishing
B. Fishing
C. Vishing
D. Virus
7.In this attack, attackers use popular search terms and use SEO
2023-2024
A. Botnet
B. Distributed DoS
C. SEO poisoning
D. Malware
2023-2024 8. Ahmad is using the same password for all his accounts.
This is a good cybersecurity practice.
CCDI – Term 1
A. True B. False
A. denial of service
B. distribution of servers
C. data of server
D. SEO poisoning
Lesson
2023-2024
Lessons Activities
EXIT
Assess yourself TICKET
My Learning
My
In LMS
2023-2024
Learning
Scale
CCDI – Term 1
100%
80%
60%
20%
Lesson
2023-2024
Lessons Activities
EXIT
Assess yourself TICKET
My Learning
Read the presentation (Week2) in LMS
2023-2024
Finish
CCDI – Term 1
To get full
marks in
effort
Finish
LMS
2023-2024
Thank You
CCDI – Term 1