title |
---|
Lab 1: Is the Threat Real |
Introduction
Introduction
This week we have had a look at cyber security in general, and examined some of the threats to our computer systems and data.
In this lab we are going to take a closer look at these factors.
Pre Task (Introductions)
- Group Task
- Random Group allocation, (hopefully, through breakout rooms)
- No bearing on the coursework etc.
Main Tasks
Introduction
In your groups research and discuss each topic.
- Find Examples of the problem
- Research figures to support your views
At the end of each session, be prepared for a short (<5 Mins) presentation on your findings.
How to Present
- No Right or Wrong Ideas.
- You have a whiteboard,
- Text, Images, Hand Drawn.
Task 1: What is Cyber?
Task 1:
- First let get your views on what "Cyber" is?
- What does it mean ?
- What do "Cyber" people do?
- What kind of things might be important?
- What do "Normal" people have to worry about.
Task 2: (30 Mins)
In this weeks articles we introduced the OWASP Top 10. In your Groups:
- What as a group did you find the most interesting Vulnerability.
- What examples of real world instances of these Vulnerabilities can you think of?