Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Week 7: When your defences fail

Introduction

Download this video clip.Video player: ou_futurelearn_cyber_security_vid_1030.mp4
Skip transcript

Transcript

CORY DOCTOROW
Over the past few weeks, we've looked at the threats to your digital information and the technologies available to protect it. Now you know how cryptography can help you keep your secrets and how to protect your network from an attack. But what if you are attacked? This week, we're going to look at what can go wrong when an attack on the security of your information is successful. Using case studies, we'll look at individuals and organisations that have been hit and see what impact it had on them.
This will help you learn to recognise the signs of an attack, arm you with the information on how to recover from a security breach, and how to stop it happening again. Just as importantly, we'll be looking at backing up your data, and the pros and cons of various approaches. 'Til next week.
End transcript
 
Interactive feature not available in single page view (see it in standard view).

Over the past few weeks, you’ve learned about technologies that can help improve the security of your digital information. You now have an understanding of how cryptography helps keep information private and prevents information from being modified and how to protect networks from attack.

But, as Cory explains, information cannot be protected by technology alone and it is important to have a good awareness of what kind of things can go wrong when an attack on your information has been successful.

This week will help you to recognise the signs of an attack, to know how and where to report the problem, and to consider what you can do to recover from the security breach and stop it happening again.

Week 7 game – Hidden Connections

It is recommended that you use a desktop/laptop computer to play the games in this course, and use headphones where possible for the best audio experience.

Continue your learning by following the link to this week's game:

Week 7 game – Hidden Connections (open this link in a new tab/window so you can come back here easily after playing the game) [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)]

A note on learning pathways

Learning pathways are a recommendation only – you may choose to follow your own learning pathway and complete all sections, if you feel this will help you to complete the end of week quiz successfully.

Please note:

  • The Amber pathway includes the extended topics of the week.
  • The Green Pathway does NOT include the extended topics of the week.
CYBER_B2

Take your learning further

Making the decision to study can be a big step, which is why you'll want a trusted University. The Open University has 50 years’ experience delivering flexible learning and 170,000 students are studying with us right now. Take a look at all Open University courses.

If you are new to University-level study, we offer two introductory routes to our qualifications. You could either choose to start with an Access module, or a module which allows you to count your previous learning towards an Open University qualification. Read our guide on Where to take your learning next for more information.

Not ready for formal University study? Then browse over 1000 free courses on OpenLearn and sign up to our newsletter to hear about new free courses as they are released.

Every year, thousands of students decide to study with The Open University. With over 120 qualifications, we’ve got the right course for you.

Request an Open University prospectus371