Professional Documents
Culture Documents
Cyber Security
This session
Intent
To learn about cybercrime and the risks and effects it has on
individuals and organisations.
Implementation
- To identify forms of cybercrime; possible motives; and tactics used
by cyber criminals
- To outline how cybercrime can affect individuals and organisations
- To identify and implement protective methods to maintain
cybersecurity.
- To identify and describe legislation and ethical conduct in relation
to the maintenance of cyber security.
Impact
Learners who understand how to protect themselves against
cyber criminals and the reasons why self-vigilance and –
protection are important.
What is Cyber security?
When you have finished discussing, click on this box to reveal some answers.
Impact on Being
self worth Blamed for exploited
crime
Did you
Can you think think
of any of the
real-life sameofanswers?
examples these tactics being
used? Do you think you could be taken in by any of these tactics?
Which do you think would be the most difficult to see as a cyber
crime?
Who do you think could be easily tricked by these tactics?
Methods that can be used to maintain
Cybersecurity.
Installing antivirus software
Turning on firewall
Regular updating
Discuss the methods you think canNot beopening
used topop keep
ups individuals and organisations safe
Use secure passwords online.
/ 2 factor authentication
Avoiding emails from unknown sources
When you have finished discussing, clickattachments
Care with email on this box to reveal some answers.
Not visiting suspect sites or clicking unknown links
Protecting personal information/data
Back up information
Did you think of the same answers?
Do you have any security measures in place? Have you
worked for any organisations that implemented any of
these methods to maintain security?
Importance of cyber security testing
Forces staff to Identifies new
regularly change vulnerabilities Tests if your
Routine testing before hackers do security measures
passwords
means you wont are still effective
forget
Discuss the reasons you believe it is important to undertake regular securityWorks
testing,
like afor both
soldier
patrolling the
individuals and organisations. perimeter checking
New ways to hack a
Left unchecked Checks for gaps fences
system are
firewalls become that might have
When you have finished
emerging all the discussing, click on this box to reveal some
appeared
answers.
out of date and time
vulnerable Catches new
breach attempts
Ethical hackers can
Makes sure former
show you security
Prevents costly data staff no longer have
gaps in your
breaches Did you think of the same access
answers?
to systems
software
The UK GDPR and DPA 2018 set a maximum fine of £17.5 million or 4% of annual global turnover –
whichever is greater
Setting up access and user permissions for
share documents.
Activity
Using your own device and under Tutor Observation
Once your account is setup, upload one file (Cybersecurity PowerPoint Presentation) and share it with
your tutor.
By clicking on link below, you will find step-by-step guide of how to create Google Drive Account: