This unit introduces students to the dangers of our interconnected world, and how cybersecurity is needed to keep our networks and online identities safe. It also includes techniques used by cybercriminals to steal data, disrupt systems, and infiltrate networks. The students will start by considering the value of their data to organisations and what they might use it for. They will then look at social engineering techniques used by cybercriminals to try to trick users into giving away their personal data.  Then they study the more common cybercrimes such as hacking, DDoS attacks, and malware, as well as looking at methods to protect themselves and our networks against these attacks.
There are very clear learning objectives and the new Learning Graphs to plan differentiated pathways for students through the unit.  

Lesson 6 includes a link to ncce.io/cybercareers.  There are more links for Cyber Security Careers on the National Stem Website at https://www.stem.org.uk/resources/community/collection/464119/cyber-security-and-cryptography

The unit resources include a useful learning graph (.jpg file) to show how the unit content is sequenced - see this link https://blog.teachcomputing.org/approaches-to-developing-progression  for an explanation.

 

Resources

Cybersecurity Overview

This resource provides a unit overview for the Year 9 ‘Cybersecurity’ unit of work. It gives a clear overview of objectives to be covered within each session and a learning graph to show the range of skills being developed through this computing unit.

 

Lesson 1 - You and your data

The aim of this lesson is to introduce the students to the unit and to help them understand the value of data to companies. The focus will be on what data companies collect from their users and how they use it. Students will explore this topic through scenarios as well as by looking at the privacy policies of some...

Lesson 2 - Social engineering

The aim of this lesson is for students to become aware of how humans can be a weak point in the system, as well as looking at the social engineering tactics deployed by cybercriminals to dupe users into giving away data that could lead to further crime. The lesson starts with the students using a Scratch program...

Lesson 3 - Script kiddies

The aim of this lesson is for students to explore the concept of hacking and the techniques used by hackers to exploit computer systems. The lesson starts with the students looking for clues to hack into a friend’s account to help his parents find out where he is. They will then be forced to think about the ethics...

Pages

Published by

Actions

Share this resource