How to Identify and Mitigate Cyber Threats

D
i
g
i
t
a
l
C
i
t
i
z
e
n
s
h
i
p
Lesson 13
 
H
O
W
 
T
O
 
I
D
E
N
T
I
F
Y
 
A
N
D
M
I
T
I
G
A
T
E
 
C
Y
B
E
R
T
H
R
E
A
T
S
02
I
 
h
a
v
e
 
a
 
v
i
r
u
s
!
Lesson 13: How to Identify and Mitigate Cyber Threats
Have you heard of the term ‘malware’ before? Do
you know what it means?
Have you heard about computer viruses? What is
your understanding of them?
How do you think that computer virus is similar or
different to a physical virus which might make you fall
ill?
Do you think it is possible to escape ever having a
malware attack?
03
D
e
f
i
n
i
t
i
o
n
s
Lesson 13: How to Identify and Mitigate Cyber Threats
D
e
f
i
n
i
t
i
o
n
s
 
Y
o
u
 
S
h
o
u
l
d
 
K
n
o
w
M
a
l
w
a
r
e
Software that is specifically designed to disrupt,
damage, or gain unauthorised access to a computer
system. Malware is a catch-all term for any type of
malicious software.
C
o
m
p
u
t
e
r
 
V
i
r
u
s
A computer program that, when executed, can modify
computer programs and insert different instructions
which might be used to steal, modify or destroy
data. A computer virus is a specific type of malware
that self-replicates by inserting its code into other
programs.
According to the UN, cybercrime (theft,
embezzlement, data hacking, general
destruction of sites and devices) has risen by
600% due to the COVID-19 pandemic.
 
Cybercrime will cost companies worldwide an
estimated USD 10.5 Trillion annually by 2025
(up from USD 3 Trillion in 2015).
Level 2 | Digital Citizenship
04
M
a
l
w
a
r
e
 
b
u
g
Lesson 13: How to Identify and Mitigate Cyber Threats
Lesson 13: How to Identify and Mitigate Cyber Threats
5
D
i
f
f
e
r
e
n
t
 
t
y
p
e
s
 
o
f
 
m
a
l
w
a
r
e
Level 2 | Digital Citizenship
06
M
a
t
c
h
 
t
h
e
 
t
e
r
m
s
w
i
t
h
 
t
h
e
 
d
e
f
i
n
i
t
i
o
n
s
Lesson 13: How to Identify and Mitigate Cyber Threats
W
o
r
m
s
S
p
y
w
a
r
e
R
a
n
s
o
m
w
a
r
e
V
i
r
u
s
e
s
T
r
o
j
a
n
 
H
o
r
s
e
A
d
w
a
r
e
A bad code or program that attaches itself to a host to harm your device
Software that copies itself to infect your device.
This program appears to be helpful, but once it’s downloaded it attacks your
device.
This software installs itself on your device and can steal your passwords,
email addresses and personal information.
This software uses false advertisements online to infect your computer and
steal your information
This software takes control of your computer and won’t release your data until
money is paid to get it back.
07
D
e
f
e
n
d
 
a
n
d
 
A
t
t
a
c
k
!
Lesson 13: How to Identify and Mitigate Cyber Threats
In this activity, you will get a taste of how cybersecurity involves
thinking about possible attacks.
There are two kinds of teams: Red Team and Blue Team
The Red Teams: you are trying to find out the secret information
that the Blue Teams have
The Blue Teams: you will be in possession of some secret
information which you must guard from the Red Teams
08
D
e
f
e
n
d
 
a
n
d
 
A
t
t
a
c
k
!
Lesson 13: How to Identify and Mitigate Cyber Threats
Once your teams are established, you can meet for 3-5 minutes
to discuss your strategies.
How will you obtain the secret information?
How will you defend your secret information?
You will be sharing your strategies with the class.
You can imagine that you can use any resources that would
normally be available to you.
 
 
What are your strategies to obtain the secret
information?
How did you choose the strategies that you thought
would work the best?
Do you think you would be able to succeed?
Have you thought about what the blue team will do
in response to defend themselves against your
attack?
09
A
t
t
a
c
k
Lesson 13: How to Identify and Mitigate Cyber Threats
R
e
d
 
t
e
a
m
s
What are your strategies to defend your information?
How did you choose the strategies that you thought
would work the best?
Did you hear any attack strategies which you had not
thought of?
What are your options to defend your data?
What can you do instead of sit and wait for an attack
to come?
010
A
t
t
a
c
k
Lesson 13: How to Identify and Mitigate Cyber Threats
B
l
u
e
 
t
e
a
m
s
011
S
t
r
a
t
e
g
i
e
s
 
t
o
 
a
v
o
i
d
 
p
h
i
s
h
i
n
g
Lesson 13: How to Identify and Mitigate Cyber Threats
I
m
a
g
i
n
e
 
b
e
i
n
g
 
a
 
c
y
b
e
r
s
e
c
u
r
i
t
y
 
e
x
p
e
r
t
 
h
i
r
e
d
 
b
y
 
a
 
b
i
g
 
c
o
m
p
a
n
y
 
t
o
p
r
e
v
e
n
t
 
t
h
e
s
e
 
k
i
n
d
s
 
o
f
 
d
a
t
a
 
s
t
e
a
l
i
n
g
 
a
t
t
a
c
k
s
.
W
h
i
c
h
 
s
t
r
a
t
e
g
i
e
s
 
f
r
o
m
 
t
h
e
 
R
e
d
 
T
e
a
m
/
B
l
u
e
 
T
e
a
m
 
e
x
e
r
c
i
s
e
 
d
o
 
 
y
o
u
t
h
i
n
k
 
w
o
u
l
d
 
w
o
r
k
?
N
o
w
 
t
h
a
t
 
y
o
u
 
h
a
v
e
 
h
a
d
 
t
i
m
e
 
t
o
 
t
h
i
n
k
 
a
b
o
u
t
 
i
t
,
 
a
r
e
 
t
h
e
r
e
 
a
n
y
 
o
t
h
e
r
i
d
e
a
s
 
o
n
 
h
o
w
 
t
o
 
p
r
o
t
e
c
t
 
y
o
u
r
 
d
a
t
a
?
ccc
012
T
a
k
e
-
h
o
m
e
 
a
c
t
i
v
i
t
y
Lesson 13: How to Identify and Mitigate Cyber Threats
Level 2 | Digital Citizenship
H
o
w
 
d
o
 
y
o
u
 
t
h
i
n
k
 
t
h
a
t
 
C
y
b
e
r
s
e
c
u
r
i
t
y
 
a
t
t
a
c
k
s
i
m
p
a
c
t
 
u
s
 
a
s
 
i
n
d
i
v
i
d
u
a
l
s
 
a
n
d
 
a
s
 
a
 
s
o
c
i
e
t
y
?
T
h
i
n
k
 
t
h
r
o
u
g
h
 
a
l
l
 
t
h
e
 
v
a
r
i
o
u
s
 
i
m
p
a
c
t
s
D
o
c
u
m
e
n
t
 
t
h
e
 
i
m
p
a
c
t
s
D
o
e
s
 
t
h
i
s
 
m
a
k
e
 
y
o
u
 
f
e
e
l
 
m
o
r
e
 
c
o
n
c
e
r
n
e
d
 
t
o
e
n
s
u
r
e
 
t
h
a
t
 
y
o
u
r
 
d
a
t
a
 
i
s
 
p
r
o
t
e
c
t
e
d
?
Created by
Slide Note
Embed
Share

Learn how to identify and mitigate cyber threats, including malware and viruses. Understand the different types of malware and their impact on devices. Enhance your digital citizenship skills to protect yourself online.

  • Digital Citizenship
  • Cyber Threats
  • Malware
  • Viruses
  • Mitigation
  • Cybersecurity
  • Online Protection

Uploaded on Dec 21, 2023 | 5 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Digital Citizenship Lesson 13 HOW TO IDENTIFY AND MITIGATE CYBER THREATS

  2. Level 2 | Digital Citizenship I have a virus! Have you heard of the term malware before? Do you know what it means? Have you heard about computer viruses? What is your understanding of them? How do you think that computer virus is similar or different to a physical virus which might make you fall ill? Do you think it is possible to escape ever having a malware attack? Lesson 13: How to Identify and Mitigate Cyber Threats 02

  3. Level 2 | Digital Citizenship Definitions Definitions You Should Know Malware Software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system. Malware is a catch-all term for any type of malicious software. According to the UN, cybercrime (theft, embezzlement, data hacking, general destruction of sites and devices) has risen by 600% due to the COVID-19 pandemic. Computer Virus Cybercrime will cost companies worldwide an estimated USD 10.5 Trillion annually by 2025 (up from USD 3 Trillion in 2015). A computer program that, when executed, can modify computer programs and insert different instructions which might be used to steal, modify or destroy data. A computer virus is a specific type of malware that self-replicates by inserting its code into other programs. Lesson 13: How to Identify and Mitigate Cyber Threats 03

  4. Level 2 | Digital Citizenship Level 2 | Digital Citizenship Malware bug Lesson 13: How to Identify and Mitigate Cyber Threats 04

  5. Level 2 | Digital Citizenship Level 2 | Digital Citizenship Different types of malware Lesson 13: How to Identify and Mitigate Cyber Threats 5

  6. Level 2 | Digital Citizenship Match the terms with the definitions A bad code or program that attaches itself to a host to harm your device Worms Software that copies itself to infect your device. Spyware This program appears to be helpful, but once it s downloaded it attacks your device. Ransomware This software installs itself on your device and can steal your passwords, email addresses and personal information. Viruses This software uses false advertisements online to infect your computer and steal your information Trojan Horse This software takes control of your computer and won t release your data until money is paid to get it back. Adware Lesson 13: How to Identify and Mitigate Cyber Threats 06

  7. Level 2 | Digital Citizenship Defend and Attack! In this activity, you will get a taste of how cybersecurity involves thinking about possible attacks. There are two kinds of teams: Red Team and Blue Team The Red Teams: you are trying to find out the secret information that the Blue Teams have The Blue Teams: you will be in possession of some secret information which you must guard from the Red Teams Lesson 13: How to Identify and Mitigate Cyber Threats 07

  8. Level 2 | Digital Citizenship Defend and Attack! Once your teams are established, you can meet for 3-5 minutes to discuss your strategies. How will you obtain the secret information? How will you defend your secret information? You will be sharing your strategies with the class. You can imagine that you can use any resources that would normally be available to you. Lesson 13: How to Identify and Mitigate Cyber Threats 08

  9. Level 2 | Digital Citizenship Attack Red teams What are your strategies to obtain the secret information? How did you choose the strategies that you thought would work the best? Do you think you would be able to succeed? Have you thought about what the blue team will do in response to defend themselves against your attack? Lesson 13: How to Identify and Mitigate Cyber Threats 09

  10. Level 2 | Digital Citizenship Attack Blue teams What are your strategies to defend your information? How did you choose the strategies that you thought would work the best? Did you hear any attack strategies which you had not thought of? What are your options to defend your data? What can you do instead of sit and wait for an attack to come? Lesson 13: How to Identify and Mitigate Cyber Threats 010

  11. Level 2 | Digital Citizenship Strategies to avoid phishing Imagine being a cybersecurity expert hired by a big company to prevent these kinds of data stealing attacks. Which strategies from the Red Team/Blue Team exercise do you think would work? Now that you have had time to think about it, are there any other ideas on how to protect your data? ccc Lesson 13: How to Identify and Mitigate Cyber Threats 011

  12. Level 2 | Digital Citizenship Level 2 | Digital Citizenship Take-home activity How do you think that Cybersecurity attacks impact us as individuals and as a society? Think through all the various impacts Document the impacts Does this make you feel more concerned to ensure that your data is protected? Lesson 13: How to Identify and Mitigate Cyber Threats 012

  13. Created by

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#