Presentation is loading. Please wait.

Presentation is loading. Please wait.

Characterising Malware Art/IT/business. Watch the following clips... Clip One (1973) Clip Two (1997) Clip Three (2008)

Similar presentations


Presentation on theme: "Characterising Malware Art/IT/business. Watch the following clips... Clip One (1973) Clip Two (1997) Clip Three (2008)"— Presentation transcript:

1 Characterising Malware Art/IT/business

2 Watch the following clips... Clip One (1973) Clip Two (1997) Clip Three (2008)

3 Public Service Advertisements. Tufty was created by RoSPA (the Royal Society for the Prevention of Accidents) in 1953 and started teaching road safety and continues to this day. The Tufty Club was set up in 1961 as a nationwide network of local groups to promote road safety to the under fives. The Hedgehogs campaign ran from 1997 to 2008 in a series of 10 adverts highlighting various road safety dangers.

4 Why? Did the road safety organisations choose talking animals in the advertisements?

5 Young children... Obviously still need to be taught the importance of crossing the road safely, but they also need to be taught the importance of cyber safety, too. We are going to create some goodies and baddies to teach young children about cyber security.

6 SPYWARE: Software that allows advertisers or hackers to gather sensitive information, without your permission. Spies, snooping, eyes, glasses, glaring, stealing, grabbing, grasping, secretive, careful, sly... TROJANS: Programmes that pretend to be legitimate software, but actually carry out hidden, harmful functions. Two-faced, facade, pretend, faker, nice on the outside, nasty on the inside, charming, seems- friendly, dangerous.... VIRUSES: Computer programs that can spread by making copies of themselves. Replicate, copy, repeat, spread, disease, illness, infection... WORMS : Viruses that create copies of themselves across the internet or local networks (they can spread themselves without needing a carrier program or file). Spread, grow, enlarge, overtake, reach, swell, escape... Malware: Software that is intended to damage or disable computers and computer systems.

7 ANTI-VIRUS: This software is used to prevent, detect and remove malware. Stop, guard, police, find evidence, notices behaviours, track crime... ENCRYPTION: The process of encoding messages (or information) in such a way that eavesdroppers or hackers can’t read it, but that authorised parties can. Clever, secrets, key, fix, complicate, military, private, confuse... FIREWALL: This hardware or software controls the incoming and outgoing network traffic by analysing the data packets and deciding whether they should be allowed through or not, based on a set of rules. Control, direct, filter, check, watch, police, judge... CAUTION: This is care taken to avoid danger or mistakes and might be the most important malware defence. If computer users show caution, it’s harder for Malware to be launched. Care, concern, prudence, warning, vigilent, watchful... Cyber Security: The following are all important methods of defence against cyber attack.

8 Show your drawing... To the other people you’re working with. Can you tell which type of malware or cyber defence each other have drawn?

9 Public Service Ads. Now we’ve got all these brilliant characters...how could we use them to teach younger children about cyber security? Come up with a business plan about how you’d use the characters and why you think your idea is the best. Pop up warnings on email? TV ad? TV show/cartoon? Magazine/comic? Club?

10 Your pitch... Your group are going to make a pitch to the rest of the class, detailing how you are going to use the characters to boost cyber awareness amongst young children in the UK. Consider what, when, where, why, how. Can you see an opportunity to make money and so potentially extend or expand the project?


Download ppt "Characterising Malware Art/IT/business. Watch the following clips... Clip One (1973) Clip Two (1997) Clip Three (2008)"

Similar presentations


Ads by Google