Unit 1.6 Systems security Lesson 2

Slides:



Advertisements
Similar presentations
A Level Business Investment Appraisal Lesson Elements.
Advertisements

Women in Literature An introductory lesson. Equality When we ask the question, Are women equal to men? in what ways are we using the word "equal"? Discuss.
A Level Chemistry A Topic Exploration Pack
A Level Physics A Delivery Guide Modelling decay of charge Key Concepts.
© OCR 2016 Motion graphs. © OCR 2016 MOTION GRAPHS LESSON ELEMENT.
© OCR 2016 H070 Topic Title H470 Topic Title Urban Futures Learner Resource 4 – Push and Pull Factors.
© OCR 2016 H070 Topic Title H470 Topic Title Rotations.
The purpose of one Christian Aid Agency
Marriage and the wedding ceremony
Learner Activity 2: Boltzmann Distribution Curves Part of the ‘Rates of reaction and the Arrhenius equation’ Topic Exploration Pack.
The Boltzmann Distribution
A Level Business Investment Appraisal Lesson Elements.
Chapter 40 Internet Security.
Vectors H070 Topic Title H470 Topic Title.
Burglary picture game.
China and its rulers activities
H070 Topic Title H470 Topic Title Delivery Guide (Learner Resource)
Balancing Equations Lesson Element.
Unit 2.5 Translators and Facilities of Languages – Lesson 1
Delivery Guide Distinctive Landscapes © OCR 2017
Liberals & Conservatives FR.
Unit 2.5 Translators and Facilities of Languages – Lesson 2
H070 Topic Title H470 Topic Title Urban Futures
Glacier National Park, MT
A Level Physics Delivery Guide.
Lesson Objectives Aims You should be able to:
The Maxwell–Boltzmann Distribution
Watch this video clip taken from Futurama
Unit 2.3 Robust Programs Lesson 2 - Testing Programs
H070 Topic Title H470 Topic Title Urban Futures
Unit 2.3 Robust Programs Lesson 1 - Defensive Design Consideration
Understand Core Security Principles
Environmental Challenges
Unit 1.4 Wired and Wireless Networks Lesson 2
Unit Network Topologies, protocols and layers Lesson 3
Landscapes of the UK Learner Resource 3 Comparing characteristics.
Teaching Computing to GCSE
Unit 1.4 Wired and Wireless Networks Lesson 1
Unit 1.6 Systems security Lesson 3
Unit Network Topologies, protocols and layers Lesson 2
Unit Network Topologies, protocols and layers Lesson 1
Theft picture game.
A Level Business Lesson Elements.
Electromagnetic spectrum
Combination of Transformations
Electromagnetic spectrum
Unit 1.6 Systems security Lesson 4
An introductory lesson
Roots and Shoots Lesson Element.
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Unit 1.4 Wired and Wireless Networks Lesson 3
Unit 1.3 Storage Lesson 2: Storing Data
The stack is eroded and weathered creating a stump
What makes these UK landscapes distinctive?
Unit 1.1 Systems Architecture Lesson 1
Networking for Home and Small Businesses – Chapter 8
Learner Activity 2: Boltzmann Distribution Curves Part of the ‘Rates of reaction and the Arrhenius equation’ Topic Exploration Pack.
TCP/IP routing simulation
H070 Topic Title H470 Topic Title Urban Futures
Unit 1.3 Storage Lesson 1: Storage Devices
Unit 1.1 System Architecture Lesson 2
Unit 1.3 Storage Lesson 1: Storage Devices
Networking for Home and Small Businesses – Chapter 8
A Level Business Investment Appraisal Lesson Elements.
Who… What… Why… When… Where… How… Could… Should….
Networking for Home and Small Businesses – Chapter 8
Who… What… Why… When… Where… How… Could… Should….
What evidence is there to suggest climate change is a natural process?
Describing Graphs Describe the overall trend shown on the graph
Unit 1.6 Systems security Lesson 1
Presentation transcript:

Unit 1.6 Systems security Lesson 2

This lesson covers the following from specification 1 This lesson covers the following from specification 1.6 System Security: Forms of attack Threats posed to networks: Malware Phishing People as the weak point in secure systems (social engineering) Brute force attacks DDOS Data interception and theft SQL injection Poor network policy Identifying and preventing vulnerabilities Penetration testing Network forensics Network policies Anti-malware software Firewalls User access levels Passwords Encryption

Key Words Brute force attacks DDOS Botnet Exploit SQL injection

Big Picture What is a brute force attack? https://www.youtube.com/watch?v=4d7sBxAdAes

Learning Objectives Understand the meaning of DDOS and brute force attacks Explain the effects of a DDOS attack Explain how to be protected against DDOS attacks Understand the concept of SQL injection Explain how a vulnerability can be exploited

Engagement Activity What DDOS attacks have you heard about in recent years? Who was involved? Who was affected by the attack (business, clients, customers)? Was there a motive around the attack?

Brute force attacks Trial and error method Can be used for gaining access to password-based entry systems Consists of an attacker trying possible passwords and passphrases until a correct one is found

DDOS https://www.youtube.com/watch?time_continue=3&v=NogCN78XN2w

DDOS Overloading a website with unwanted traffic Uses a number of computers over a network of infected machines which send requests to a website which would bring it offline Used as a ‘botnet’

Activity 1 Answer the following questions: Extension: Explain a recent DDOS attack and discuss the effects on customers and businesses. Research and describe a ’botnet’ and explain how they originate Extension: How can companies protect themselves from DDOS attacks?

SQL Injection Where an attacker can execute malicious SQL statements using software which controls a database management system Can affect websites that use SQL-based databases Companies that use SQL include Google, YouTube, PayPal, eBay, Cisco Exploits that have been identified must be patched quickly to reduce impact on businesses therefore important for organisations to update infrastructure regularly.

SQL Injection By exploiting the vulnerabilities of SQL through injection, attackers could access systems containing customer data, intellectual property and other sensitive information.

What is needed to carry out an SQL injection? A relational database using SQL at the time of the attack Malicious code to be used in an SQL query when it is run in order for the injection attack to take place.

The effects of a successful attack Should an attacker gain access to the database, they could: Bypass authentication procedures and impersonate specific users Execute queries, exposing data Altering data, resulting in data integrity issues Delete data

Activity 2 Create an informative leaflet for SQL administrators explaining the importance of protecting against SQL injection and how attackers can exploit vulnerabilities in SQL databases.

Plenary Paired quiz – best answer sharing What is a DDOS attack? What are botnets? How does SQL injection work?

OCR Resources: the small print OCR’s resources are provided to support the teaching of OCR specifications, but in no way constitute an endorsed teaching method that is required by the Board, and the decision to use them lies with the individual teacher. Whilst every effort is made to ensure the accuracy of the content, OCR cannot be held responsible for any errors or omissions within these resources. © OCR 2017 - This resource may be freely copied and distributed, as long as the OCR logo and this message remain intact and OCR is acknowledged as the originator of this work. OCR acknowledges the use of the following content: n/a Please get in touch if you want to discuss the accessibility of resources we offer to support delivery of our qualifications: resources.feedback@ocr.org.uk