GCSE Cyber Security
Cyber security is the branch of Computer Science that deals with online threats and how to keep data secure. As more devices are connected via the internet it is increasingly important to understand cyber security.
With the advent of the data age it more important than ever that the data we receive and create is kept secure, both from accidental leakage and corruption, and from malicious users who may target the user in order to gain access to that data.
These resources look at how encryption techniques work, how to avoid data corruption, new and upcoming methods for identifying the user to the computer, and more generic issues around ways to keep computer access secure. This topic also covers the legal issues around computer use.
Links and Resources
Encryption is the key to information security. The key to modern encryption is that using only public information, a sender can lock up their message in such a way that it can only be unlocked by the intended recipient. The resource begins with a detailed explanation of the activity and how the process of encryption works and how to carry out the activity with a class. There follows further information about public-key encryption followed by worksheets for student use. This collection of twenty activities from Computer Science Unplugged is designed to aid the teaching and learning of computer science through engaging games and puzzles using cards, string, crayons and lots of running around.
In this resource, the students are asked to look at various aspects of data security. In part this covers cyber security but it also looks at data integrity and ensuring that users data does not become corrupt through various means. There are a variety of activities provided, and all of the necessary resources are included. There are also at points brief discussions relating to exam technique and how to ensure that the maximum possible marks are achieved for a given question.
This resource contains two sets of triominoes, based around the theme of internet security. A simple set with only 4 cards, where three definitions and their key words need to be matched. The set also has two extra definitions and key words to act as distractors from the actual answers, an extension might be to get students to add the correct answers for those too. The more complex set has 17 key words and definitions to match up, but no distractors. Both sets are also supplied with the solutions as well as a Formulator Tarsia file to allow for editing.
This resource consists of two starter activities, the Cyber Security Diamond asks students to take 9 statements relating to Cyber Security and rank them (in a diamond layout) from most to least important. The Social Engineering Activity contains four definitions of types of social engineering activity and asks students to match 15 statements to the correct activity. These starters could be used as part of broader lessons on the same subjects too, as part of the main body of a lesson, or as revision tasks.
This resource contains a Lesson Plan centred on the Computer Misuse Act and the choices students might have to make with respect to the act and peer pressure. It helps make clear to students what activities are considered criminal ones with respect to the act as well as asking them to rank criminal activity online according to seriousness and gives them some insight into what might be the consequences of committing some of these offences.
These resources constitute a range of infographics (posters) about various aspects of Cyber Security and how to mitigate the threats that computer systems are daily subjected to. The posters could be used as teaching resources with lessons based around their content, with students creating their own resources based on the information, given. They could be used as the starting points for a variety of projects, or they might just be a useful decoration in the classroom. The infographics are entitled: Password Security Guidance, 10 Steps to Cyber Security, Combatting Cyber Attacks, Bring Your Own Device and Managing Information Risk
These resources contain public sector information provided by the National Cyber Security Centre (NCSC) and are licensed under the Open Government Licence v3.0.
This brief article taken from CS4FN looks at how a user authenticates themselves to a computer could be used as the starting point for class discussions around passwords, security, biometrics and other related topics concerning how users can authenticate themselves to both local computers and when online. The article discusses a method which uses the computer mouse to allow users to enter a signature, measuring how similar the movements undertaken are, rather than just the resulting image. It might be possible to get students to investigate how to implement a simplified version of this authentication method using their programming language/environment of choice.