Characterising Malware
Download
Report
Transcript Characterising Malware
Characterising Malware
Art/IT/business
Watch the following clips...
• Clip One (1973)
• Clip Two (1997)
• Clip Three (2008)
Public Service Advertisements.
• Tufty was created by RoSPA (the Royal Society for the
Prevention of Accidents) in 1953 and started teaching
road safety and continues to this day. The
Tufty Club was set up in 1961 as a nationwide
network of local groups to promote road
safety to the under fives.
• The Hedgehogs campaign ran from 1997 to
2008 in a series of 10 adverts highlighting
various road safety dangers.
Why?
• Did the road safety organisations choose
talking animals in the advertisements?
Young children...
• Obviously still need to be taught the
importance of crossing the road safely, but
they also need to be taught the importance of
cyber safety, too.
• We are going to create some goodies and
baddies to teach young children about cyber
security.
SPYWARE:
Software that allows advertisers or hackers to
gather sensitive information, without your
permission.
TROJANS:
Programmes that pretend to be legitimate
software, but actually carry out hidden, harmful
functions.
Spies, snooping, eyes, glasses, glaring,
Two-faced, facade, pretend, faker, nice on the
stealing, grabbing, grasping, secretive, careful, outside, nasty on the inside, charming, seemssly...
friendly, dangerous....
Malware:
Software that is
intended to damage or
VIRUSES:
WORMSand
:
disable computers
Computer programs that can spread by making Viruses that create copies of themselves across
computer systems.
copies of themselves.
the internet or local networks (they can spread
themselves without needing a carrier program
Replicate, copy, repeat, spread, disease, illness, or file).
infection...
Spread, grow, enlarge, overtake, reach, swell,
escape...
ANTI-VIRUS:
This software is used to prevent, detect and
remove malware.
Stop, guard, police, find evidence, notices
behaviours, track crime...
ENCRYPTION:
The process of encoding messages (or
information) in such a way that eavesdroppers
or hackers can’t read it, but that authorised
parties can.
Clever, secrets, key, fix, complicate, military,
private, confuse...
Cyber Security:
The following are all
important methods
of
FIREWALL:
CAUTION:
This hardware or software controls the defence
This is care taken to avoid danger or mistakes
incoming and outgoing network traffic by
and might be the most important malware
against
attack.
analysing the data packets and
deciding cyber
defence.
If computer users show caution, it’s
whether they should be allowed through or
not, based on a set of rules.
Control, direct, filter, check, watch, police,
judge...
harder for Malware to be launched.
Care, concern, prudence, warning, vigilent,
watchful...
Show your drawing...
• To the other people you’re working with.
• Can you tell which type of malware or cyber
defence each other have drawn?
Public Service Ads.
• Now we’ve got all these brilliant
characters...how could we use them to teach
younger children about cyber security?
• Come up with a business plan about how
you’d use the characters and why you think
your idea is the best.
• Pop up warnings on email? TV ad? TV
show/cartoon? Magazine/comic? Club?
Your pitch...
• Your group are going to make a pitch to the
rest of the class, detailing how you are going
to use the characters to boost cyber
awareness amongst young children in the UK.
• Consider what, when, where, why, how.
• Can you see an opportunity to make money
and so potentially extend or expand the
project?