video

Lesson video

In progress...

Loading...

Hello and welcome to lesson six in what is our final lesson of our cybersecurity unit.

I'm Ben, and this lesson is called under attack.

So in this lesson you'll get an opportunity to put into practise all the skills that we've learned about so far.

So the different types of cyber threats, and as well as the different protection methods we've learned about and put them all into practise in order to protect a network from an incoming cyber attack.

So, you can clear away any distractions that you might have, all you'll need for this lesson is a web browser and access to the website Scratch.

And once you don't need an account for Scratch, it'd be great if you could ask your parents or carers for permission before accessing that website, okay? So clear away any distractions, turn off your mobile phone, and once you've found a nice quiet place to work, let's get started.

So really the main aim of this lesson is to identify the most effective methods to prevent cyber attacks.

Before we get going, how many methods of protecting yourself against cybercrime can you recall from lesson five? So I'd like to pause the video and see if you can maybe say out loud as many of those methods as you can think of.

Give yourself about two minutes and once you've done that unpause the video and we'll go through some of the answers.

So prevention strategies that you might have thought of.

So I've got anti-malware, firewalls, password rules, auto-updates, two-factor authentication, biometrics, CAPTCHA, and did you get at staff training? Now staff training is not something that specifically we've discussed throughout the previous lessons.

But actually it's a really important thing for organisations to invest in.

'Cause if staff were aware of the dangers out there, more importantly, how to protect themselves against it.

For example, social engineering attacks, or maybe to make them aware that downloading attachments from unknown sources has it's dangers because of the potential for viruses or malware.

If staff are aware of these things and we train staff properly, perhaps that's a really worthwhile investment.

But the question is, which of these prevention methods do you think prevents the most number of attacks? So pause the video if you can.

Go through each one of these and see if you can identify one or two that you think would prevent the most number of attacks.

Okay? So pause it and then unpause when you're ready.

Now, what did you come up with? Did you come up with one or did you think maybe all of them, do you think they all have their own individual merits? Well, maybe the next activity will help us determine that.

Now, I've got really great news for you, okay? You are now a network manager for a large online retailer, so congratulations, you got your first job.

Now, probably what our first job should be is to work out all the risks that might happen, the likelihood of them, and maybe the impact that they would have.

Have it draught in less than five.

So maybe that's something we could do first, but first let's make ourselves a nice cup of coffee and put our feet up a bit.

Hang on sir, we can't do that there, there's an incident happening right now.

So an incident being reported to you as a network manager and so what you've got to do quickly is to identify what the attack is and look at what measures need to be put in place to defend against this attack.

Remember the future of the online retailer is in your hands really.

So make sure we get to it.

So I need you to go over to task one on your worksheet now.

Follow the hyperlink and that'll tell you about the incoming alerts and what we can do about it, okay? So if you can do that now and then unpause the video when you protected and saved the network.

Okay, so how did you get on with that? Did you manage it to protect the network from all the incoming threats and more importantly, are you still in that job? Well, either way, don't be afraid to keep going back to that, how many you go with them and see if you can protect against all the different threats and work out which one of those different protection methods appeared the most amount of times.

Now our next task is to look at careers in cybersecurity because there are many jobs in cybersecurity that you might be interested in knowing what you know now.

So I'd like to go ahead and go to task two on your worksheets and that requires you to research the different types of industries and jobs that you can do related to cybersecurity.

Okay? So unpause the video when you're done.

Okay, so that's all for this unit.

Now, I really hope you take a moment to reflect upon all the learning that you've done throughout this unit.

All the different types of cyber attacks that you've learned about, and most importantly, how we can protect ourselves and networks against that.

Now, it'd be really great if you could take the multiple choice quiz at the end of this lesson, which will test the knowledge that you've learned throughout this unit, and maybe pick up on the things that you still need to develop a little bit further.

We would also love to know what you thought of this unit, and maybe you could share some of the work that you've done as well.

So, what is the work that you would be most proud of? Maybe show us that.

So if you want to do that, please ask your parents or carer to share your work on Instagram, Facebook, or Twitter, tagging @OakNational and #LearnwithOak.

Okay? So that's all from me.

I'm Ben and I hope to see you on another unit soon.