Cyber Security (2).pptx
Document Details
Uploaded by CapableTsavorite
Curro Rivonia
Tags
Full Transcript
CODING AND ROBOTICS CYBER SECURITY Baba Akelentera & Laura Mlilo Coding is an essential set of instructions that a robot can read and execute. In other CODING words, Coding is the way to communicate with AND computers. ROBOTIC Robotics combines th...
CODING AND ROBOTICS CYBER SECURITY Baba Akelentera & Laura Mlilo Coding is an essential set of instructions that a robot can read and execute. In other CODING words, Coding is the way to communicate with AND computers. ROBOTIC Robotics combines the use of electronics, mechanics, S and coding software to program robots to do particular jobs. AIM OF CODING AND ROBOTICS The Coding and Robotics subject is aimed at guiding and preparing learners to solve problems, think The Coding and Robotics subject is critically, work collaboratively and central to function in a digital and creatively, communicates well, information-driven world; apply build character and pride, function digital ICT skills and transfer these in a digital and information-driven skills to solve everyday problems world, apply digital and ICT skills in the development of learners. and to transfer these skills to solve everyday problems and its possibilities. ROBOT A robot is an autonomous machine that is able to perform certain tasks based on the inputs taken by sensors. Also, a robot is merely a mechanical piece, until it's programmed. What coding is used for Robotics? Both block-based coding and text-based coding are used for robotics. Block-based coding uses a stack of different shapes of blocks which can be easily connected to each other. Example Scratch, Blockly. Text-based coding is based on predefined keywords; a list of codes readable by a particular language. Example C++, python. CYBER SECURITY Cyber is related to the technology which contains systems, network and programs or data. Whereas security related to the protection which includes systems security, network security and application and information security. The term Cyber Security refers to techniques and practices designed to protect digital data. IMPORTANCE OF CYBER SECURITY Cyber security can be used to prevent cyber attacks. It allows us to Safeguard all types of data against theft and loss. It protects digital components, computer systems, data and unauthorised digital access. It helps us to be aware of data theft or leakage, identity theft and how to prevent them. These are cyber activities carried online with the intent to bring havoc or extorting money Some attacks are also meant to distort or steal data/information. CYBER It is also aimed to damage computer network or systems. ATTACK The person who carries or does cyber attack is called a hacker. Hackers are cyber criminals. Malware attack Phishing attack TYPES OF CYBER Pharming attack ATTACKS Spoofing attack Viruses, trojans, worms A malware is any type of software that causes harm to the computer. MALWARE This can be a file or code delivered ATTACK over a network to infect, explore or steal data. There are different types of malwares; viruses, trojans, worms and many more. The hacker sends fraudulent emails to trick people into falling in a scam. The emails will be coming from PHISHING intelligent sources to steal malware ATTACK or sensitive data like credit card information or log in credentials. These make people reveal their financial information, sensitive data and system credentials. PHARMING Pharming is a scamming practice in which malicious code is installed on ATTACK a personal computer or server, misdirecting users to fake websites without their knowledge or consent. E-mail spoofing is the forgery of an e-mail header so that the message E-MAIL appears to have originated from someone or somewhere other than SPOOFING the actual source. ATTACK E-mail spoofing is a tactic used in phishing and spam campaigns because people are more likely to open an e-mail when they think it has been sent by a legitimate source. VIRUSES A virus is a program that attempts to damage a computer system and replicate itself to the computer systems destroying/corrupting WORMS data. AND A worm is a self-replicating program that can be designed to do any number of things, such TROJANS as delete files or send documents via e-mail. A worm can negatively impact network traffic just in the process of replicating itself. A trojan is a malicious program that is disguised as legitimate software. It misleads the user of its true intent. It appears to be a normal application but when opened/executed some malicious code will run in the background. PREVENTION OF CYBER ATTACKS Threat Management firewalls – blacklists for unauthorized IP addresses and URLs screening routers – e-mail checks, file screening, phishing protection Encryption is a method for securing data by using special mathematical algorithms to convert the data into scrambled code before transmission. Anti-virus Software is a software that is designed to protect computers from Anti-Malware Apps provides malware protection. Ensure that the network connection is only available to the people intended. Bibliography Chwan-Hwa(john) Wu,J. David Irwin,. (n.d.). Introduction to Cyber Security. CRC Press T&FGroup. Education, D. o. (n.d.). CODING AND ROBOTICS. Retrieved from Department of Education : https://www.education.gov.za/Portals/0/Documents/Legislation/Call %20for%20Comments/draftcodingandroboticscurriculum/Grade7-9%20Coding %20and%20Robotics%20Draft%20CAPS%20FINAL%2019Mar2021.pdf? ver=2021-03-24-164612-000 James Graham, Richard Howard and Ryan Otson,. (n.d.). Cyber Security Essentials. CRCPress. Mar 3, 2. (2021, Mar 3). Robotics And Coding: The Complete Beginners Guide for Kids. Retrieved from Create-learn.us: https://www.create-learn.us/blog/robotics-and-coding/