10
The Trojan Horse Classics/History/ English/Cyber.

The Trojan Horse Classics/History/English/Cyber

Embed Size (px)

Citation preview

Page 1: The Trojan Horse Classics/History/English/Cyber

The Trojan Horse

Classics/History/English/Cyber.

Page 2: The Trojan Horse Classics/History/English/Cyber

Read the story of the fall of Troy

• In groups prepare to retell it in one of the following ways.

• A tableau.• A cartoon strip.• A series of tweets.• A poem.

Page 3: The Trojan Horse Classics/History/English/Cyber

Now, watch the film version...

Page 4: The Trojan Horse Classics/History/English/Cyber

Lady Macbeth/Macbeth

• “Look like the innocent flower, but be the serpent under ‘t”

Page 5: The Trojan Horse Classics/History/English/Cyber

In cyber security...

• A Trojan horse is a kind of malware, sometimes referred to just as a ‘Trojan’. Knowing what you do about the story of Troy, what would you guess a cyber Trojan does?

Page 6: The Trojan Horse Classics/History/English/Cyber

Recently:

Watch the hospital-cam

Page 7: The Trojan Horse Classics/History/English/Cyber

In groups

You’re going to design a Trojan horse with a particular audience in mind:

• Parents• Grandparents• Children• Teens

Remember...the Trojan’s thought the horse was a gift, but in fact it was a Spartan weapon: this is all about perception

Page 8: The Trojan Horse Classics/History/English/Cyber

You need to decide...

• WHERE will your audience be presented with the Trojan? On Facebook? In an email? Through an advert?

• WHO is it aimed at? You need to try to get into the mind of your audience in order that you can trick them.

• HOW will it persuade the audience it’s offering something good? Does it need to save them money? Give them an amazing opportunity? Give them access to news or celebrities? Remember, malware authors always stay up to date with what’s going on in case it helps them to trick people!

Page 9: The Trojan Horse Classics/History/English/Cyber

Let’s hear them...

The rest of the class:

• What do we think of them?• Can they be improved upon?

Page 10: The Trojan Horse Classics/History/English/Cyber

• Trojans can do nasty things to our computers; they allow black hat hackers to access our passwords and personal information or to turn on our webcams without us knowing.

• How can we stop people getting caught out by Trojans?