120 likes | 300 Views
The Trojan Horse. Classics/History/English/Cyber. Read the story of the fall of Troy. In groups prepare to retell it in one of the following ways. A tableau. A cartoon strip. A series of tweets. A poem. Now, watch the film version. Lady Macbeth/Macbeth.
E N D
The Trojan Horse Classics/History/English/Cyber.
Read the story of the fall of Troy • In groups prepare to retell it in one of the following ways. • A tableau. • A cartoon strip. • A series of tweets. • A poem.
Lady Macbeth/Macbeth • “Look like the innocent flower, but be the serpent under ‘t”
In cyber security... • A Trojan horse is a kind of malware, sometimes referred to just as a ‘Trojan’. Knowing what you do about the story of Troy, what would you guess a cyber Trojan does?
Recently: Watch the hospital-cam
In groups You’re going to design a Trojan horse with a particular audience in mind: • Parents • Grandparents • Children • Teens Remember...the Trojan’s thought the horse was a gift, but in fact it was a Spartan weapon: this is all about perception
You need to decide... • WHERE will your audience be presented with the Trojan? On Facebook? In an email? Through an advert? • WHOis it aimed at? You need to try to get into the mind of your audience in order that you can trick them. • HOW will it persuade the audience it’s offering something good? Does it need to save them money? Give them an amazing opportunity? Give them access to news or celebrities? Remember, malware authors always stay up to date with what’s going on in case it helps them to trick people!
Let’s hear them... The rest of the class: • What do we think of them? • Can they be improved upon?
Trojans can do nasty things to our computers; they allow black hat hackers to access our passwords and personal information or to turn on our webcams without us knowing. • How can we stop people getting caught out by Trojans?