Skip to content
Permalink
15106798e3
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
title
Lab 1: Is the Threat Real

Introduction

Introduction

This week we have had a look at cyber security in general, and examined some of the threats to our computer systems and data.

In this lab we are going to take a closer look at these factors.

Pre Task (Introductions)

  • Group Task
    • Random Group allocation, (hopefully, through breakout rooms)
    • No bearing on the coursework etc.

Main Tasks

Introduction

In your groups research and discuss each topic.

  • Find Examples of the problem
  • Research figures to support your views

At the end of each session, be prepared for a short (<5 Mins) presentation on your findings.

How to Present

  • No Right or Wrong Ideas.
  • You have a whiteboard,
    • Text, Images, Hand Drawn.

Task 1: What is Cyber?

Could be In Cyber

Task 1:

  • First let get your views on what "Cyber" is?
    • What does it mean ?
    • What do "Cyber" people do?
    • What kind of things might be important?
    • What do "Normal" people have to worry about.

Task 2: (30 Mins)

In this weeks articles we introduced the OWASP Top 10. In your Groups:

  • What as a group did you find the most interesting Vulnerability.
  • What examples of real world instances of these Vulnerabilities can you think of?