1 / 10

Digital Forensics and Cyber Psychology

Digital Forensics and Cyber Psychology. How computers are used to catch criminals but also how criminals trick humans!. Sort the Digital Forensics Cards. Match the threat to the definition. Psychology. What is it?. Cyber Psychology and Social Engineering.

pakuna
Télécharger la présentation

Digital Forensics and Cyber Psychology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Digital Forensics and Cyber Psychology How computers are used to catch criminals but also how criminals trick humans!

  2. Sort the Digital Forensics Cards • Match the threat to the definition...

  3. Psychology • What is it?

  4. Cyber Psychology and Social Engineering • Social engineering is the clever manipulation of the natural human tendency to trust. • Criminal hackers often use social engineering techniques to gain information about or access to their targets. • You want to get hold of some information about where your school keeps its student files and who has access to them. How do you find out?

  5. In your groups • Pick one of the cyber psychology threats and draw it or role play/act it out for the rest of the group to guess...

  6. Look at the web security threats... • What advice could you give people to reduce their chances of becoming victims of these sorts of threats?

  7. securefutures.org • The game you’re about to play has been created as a way of letting you test your cyber skills. • The games are self explanatory, you just need to create a login (maybe note it down so you don’t forget it).

  8. Plenary 1: Threat Bingo • choose nine threats from the list and put them randomly into a 3x3 square. • As Iread out the definitions you can tick off the threats and the first to get a line of three shouts ‘bingo!’ and wins.

  9. Plenary 2: Case Studies • In pairs or small groups, read the digital forensics case studies and sum them up (for the benefit of those who have the other study). Answer the following questions afterwards • What do you understand by the term ‘digital forensics’? • Discuss other crimes that might be solved using digital forensics. • What sort of skills do you need to work in digital forensics? • Are there any ethical concerns with digital forensics?

More Related