LESSON PLAN THURSDAY MARCH THE 13 TH
MASTERing THE INTERNET
TERM RH 2024 2025
SESSION 4
THE ATTACKS
YOUR MISSION : YOU ARE AT THE HEAD OF YOUR HIGHTECK DEPARTMENT IN YOUR COMPANY .You need to convince your boss to invest in a good system to avoid cyber attacks
NOTION ADVICE / CAPACITY / INCAPACITY / CONSEQUENCE
ANTICIPATION A VIDEO excellent !!!
https://www.youtube.com/watch?v=gSQgbCo6PAg
STEP 1 ANTICIPATION : what is a cyber attack ?
. HERE ARE VOCABULARY WORDS YOU COULD USE
A malicious attack
A bait ( un appat)
A breach ( une breche / une fracture)
A malware ( un programme malveillant )
A device ( un appareil)
YOUR PRODUCTION :
Some people believe it is an invoice when in fact it is a virus
A virus can take different forms
Hackers steal your information / your personal data
It can be a malware
A cyber attack is a breach in your cybersecurity system
A cyber attack is when a hacker steal your password
It is illegal and not in the public’s interest
A cyber attack is meant to prove that you are vulnerable
STEP 2 HERE ARE THE LIST OF CYBER THREATS COMPANIES COULD FACE
Nolej
https://h5p-live.nolej.app/documents/21c16118-1755-438f-abdb-d9ed1a9bc73a/previews/ibook/index.html
The threats countered by cyber-security are three-fold:
1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption.
2. Cyber-attack often involves politically motivated information gathering.
3. Cyberterrorism is intended to undermine electronic systems to cause panic or fear
Malware
Malware means malicious software. One of the most common cyber threats, malware is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer. Often spread via an unsolicited email attachment or legitimate-looking download, malware may be used by cybercriminals to make money or in politically motivated cyber-attacks.
SQL injection
An SQL (structured language query) injection is a type of cyber-attack used to take control of and steal data from a database. Cybercriminals exploit vulnerabilities in data-driven applications to insert malicious code into a databased via a malicious SQL statement. This gives them access to the sensitive information contained in the database.
Phishing
Phishing is when cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information. Phishing attacks are often used to dupe people into handing over credit card data and other personal information.
Man-in-the-middle attack
A man-in-the-middle attack is a type of cyber threat where a cybercriminal intercepts communication between two individuals in order to steal data. For example, on an unsecure WiFi network, an attacker could intercept data being passed from the victim’s device and the network.
Denial-of-service attack
A denial-of-service attack is where cybercriminals prevent a computer system from fulfilling ( remplir ) legitimate requests by overwhelming ( to overwhelm =submerger /envahir) the networks and servers with traffic. This renders the system unusable, preventing an organization from carrying out vital functions
STEP 3 WHAT SHOULD COMPANIES DO TO FIGHT BACK ?
TRANSLATE THANKS TO THE DOCUMENT AND THE NOTION ADVICE :
- Elles devraient évaluer les risques
they should do a risk assessment
- Elles feraient mieux de former leur personnel………………………………..
They had better train their staff
- Elles pourraient financer plus de ressources ……………………………
They could fund more ressources
- Elles doivent améliorer leur service informatique ……………………….
They must improve their IT services
- Je leur conseille de prendre une assurance contre les cyber dommages ……
I advise them to subscribe to a cyber liability insurance
homework /
1. MINI TEST :
learn every words in red in the lesson and be able to translate them
Aucun commentaire:
Enregistrer un commentaire