0 results for
ICT
Computing
Responsive image

5.3 Threats

Overview
Flight Path
Learning Objectives
0 results forGuest
GradeSkill_name
 5.3 I can explain what phishing is
 5.3 I can explain what hacking is
 5.3 I can explain what viruses are
 5.3 I can explain what Trojans are
 5.3 I can explain what interception is
 5.3 I can explain what eavesdropping is
 5.3 I can explain what data theft is
 5.3 I can explain what social engineering is

Strength

Improvement

Targets

Progress this topic

0%


Overall Progress for this unit

NAN%


LO156 :- I can explain what phishing is

Phishing

Flight Path

Tasks

  • Explain what phishing is and how it ususally occurs.
  • Explain what you can do to protect yourself from this threat
  • LO157 :- I can explain what hacking is

    Hacking

    Flight Path Flight Path

    Tasks

  • Explain what hacking is and how it occurs.
  • Explain what Ethical hacking is.
  • Explain what you can do to protect yourself from this threat
  • LO158 :- I can explain what viruses are

    Computer Viruses

    Flight Path

    Tasks

  • Explain what a computer virus is and how a PC becomes infected.
  • Explain the characteristics of a computer virus .
  • Explain what you can do to protect yourself from a computer virus.
  • LO159 :- I can explain what Trojans are

    Trojan(Horse)

    Flight Path

    Tasks

  • Explain what a Trojan is and how a PC becomes infected.
  • What is the difference between a Trojan and a Worm?
  • Explain what you can do to protect yourself from a Trojan horse.
  • LO160 :- I can explain what interception is

    Interception

    Flight Path

    Tasks

  • Explain what interception is in hacking terms.
  • What kind of network is most susceptible to interception?
  • What is the difference between spoofing and interception?.
  • LO161 :- I can explain what eavesdropping is

    Eavesdropping


    Flight Path

    Tasks

  • Explain what eavesdropping is in hacking terms.
  • What kind of network is most susceptible to eavesdropping?
  • How can you prevent eavesdropping?.
  • LO162 :- I can explain what data theft is

    Data Theft

    Flight Path

    Tasks

  • Explain what Data Theft is and what it involves.
  • How can you prevent data theft?.
  • LO163 :- I can explain what social engineering is

    Social Engineering

    Flight Path

    Tasks

  • What is Social Engineering and how does it occur?
  • How can you protect yourself and others from Social Engineering?.

  • 0 results forGuest
    Recent Comments

    Teacher Date: 2019-09-19


    Guest