There's no place like 127.0.0.1

In this lesson, we will look at the risks that cyberthreats pose to a network, followed by an exploration of some common methods of defending the network against attacks, such as firewalls and anti-malware.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Q1.Which of the following two are types of malware?

Select two (2) boxes

1/5

Q2.What is the definition of a computer virus?

2/5

Q3.Which of the following statements best describes a "worm"?

3/5

Q4.The Wannacry virus was an example of which type of attack?

4/5

Q5.Which one of the following wouldn't an internet bot perform?

5/5

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Q1.Which of the following two are types of malware?

Select two (2) boxes

1/5

Q2.What is the definition of a computer virus?

2/5

Q3.Which of the following statements best describes a "worm"?

3/5

Q4.The Wannacry virus was an example of which type of attack?

4/5

Q5.Which one of the following wouldn't an internet bot perform?

5/5

Video

Click on the play button to start the video. If your teacher asks you to pause the video and look at the worksheet you should:

  • Click "Close Video"
  • Click "Next" to view the activity

Your video will re-appear on the next page, and will stay paused in the right place.

Worksheet

These slides will take you through some tasks for the lesson. If you need to re-play the video, click the ‘Resume Video’ icon. If you are asked to add answers to the slides, first download or print out the worksheet. Once you have finished all the tasks, click ‘Next’ below.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

There's no place like 127.0.0.1 –

Helping you to assess what you have learnt throughout this lesson

Q1.A firewall checks incoming and outgoing network traffic

1/5

Q2.Which of the following would be the most appropriate software to identify when you system becomes infected with worms, spyware and other forms of computer viruses?

2/5

Q3.Which of the following is a method of verifying that a login attempt has been made by the account owner?

3/5

Q4.Which of the following attempts to check if you are a human user and not a malicious bot.

4/5

Q5.Which of the following would be the correct term for a large collection of malware-infected devices (zombies) used to perform an attack or to exploit known weaknesses in a system?

5/5

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

There's no place like 127.0.0.1 –

Helping you to assess what you have learnt throughout this lesson

Q1.A firewall checks incoming and outgoing network traffic

1/5

Q2.Which of the following would be the most appropriate software to identify when you system becomes infected with worms, spyware and other forms of computer viruses?

2/5

Q3.Which of the following is a method of verifying that a login attempt has been made by the account owner?

3/5

Q4.Which of the following attempts to check if you are a human user and not a malicious bot.

4/5

Q5.Which of the following would be the correct term for a large collection of malware-infected devices (zombies) used to perform an attack or to exploit known weaknesses in a system?

5/5

Lesson summary: There's no place like 127.0.0.1

It looks like you have not completed one of the quizzes.

To share your results with your teacher please complete one of the quizzes.

Time to move!

Did you know that exercise helps your concentration and ability to learn?

For 5 mins...

Move around:
Climb stairs

On the spot:
Dance

The next lesson in:
Cybersecurity
is:
Under attack

Browse Oak's lessons: