example of a knowledge organiser we use in Computer Science to show how these can be structured. I doubt that there could be much contention with the notion that ‘study’ unlocks success beyond examinations and that having the right mind-set and the right techniques really aids study. How did you get on with your study when the snow set in this week? Thanks To Wilf Peeters (7RPh), Basant Sherif (7RPh) and Ethan Skubich (7RFl) for their help with teacher training interviews this week. Notice James Saunders meeting on 9th March 2018, all limited spaces have been filled, we will be organise another meeting after Easter.
Cyber Security Knowledge Organiser Adware
Biometric Security
A form of malware that collects information about the user in order to display advertisements in the Web Browser. Measures unique characteristics of a person, such as voice pattern, the iris or retina pattern of the eye, or fingerprint patterns to allow access to a device or network.
Black box penetration test
Simulates an external hacking or cyber warfare attack.
Blagging (pretexting)
The act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely circumstances.
Brute force attack
A trial-and-error method used to obtain information such as a user password or personal identification number (PIN). Automated software is used to generate a large number of consecutive guesses.
CAPTCHA
A computer program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites.
Computer virus
A type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive. May or may not have a destructive purpose.
Cyber Security
The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
Malware
An umbrella term used to refer to a variety of forms of hostile or intrusive software.
Misconfigured access rights
When user accounts have been given incorrect permissions. This could allow a normal user to have admin level access. It can be caused by human error or a logical error in software.
Pharming
A cyberattack intended to redirect a website's traffic to another, fake site.
Penetration testing
The process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access.
Phishing
A technique of fraudulently obtaining private information, often using email or SMS.
Shouldering (shoulder surfing)
Observing a person's private information over their shoulder eg cash machine PIN.
Social engineering
The art of manipulating people so they give up confidential information.
Spyware
Programs that secretly record what you do on your computer. Its aim is usually to capture passwords, banking credentials and credit card details.
Trojan (Trojan horse)
A type of malware that is often disguised as legitimate software. Employed by cyber-thieves and hackers trying to gain access to users' systems. Once activated can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system.
Unpatched and/or outdated software
Programs or apps that contain security flaws for which an update is not available to fix or an available update has not been applied.
Weak and default passwords
Refers to any passwords that can be easily guessed, either because it's so personal to a person or because it hardly takes any time to find it via the brute-force method.
White box penetration test
Simulates a malicious insider who has knowledge of and possibly basic credentials for the target system.
Social Engineering
Malware
Other Threats
Blagging (pretexting)
Virus
Weak and default passwords
Shouldering (Shoulder surfing)
Trojan
Misconfigured access rights
Phishing
Spyware
Removable media
Pharming
Adware
Unpatched and/or outdated software
Parents’ Time Members of the Leadership Team will be available to see parents without appointment: Monday 9.00am—9.45am Tuesday 7.15am—8.00am Wednesday 3.00pm—3.45pm Thursday 5.00pm—6.00pm Friday 7.15am—8.00am