Listing all results (29)

Infographics at the National Cyber Security Centre

These resources constitute a range of infographics (posters) about various aspects of Cyber Security and how to mitigate the threats that computer systems are daily subjected to. The posters could be used as teaching resources with lessons based around their content, with students creating their own resources...

Ready Player One - Introducing EMSL aspects of the curriculum

Note - These lessons use the book 'Ready Player One' as a starting point, teachers will need to obtain a copy of the book before using the content, the school library may have a copy that could be used.

...

The Peruvian Coin Flip - Cryptographic Protocols

This activity shows how to accomplish a simple, but nevertheless seemingly impossible task -making a fair random choice by flipping a coin, between two people who don’t necessarily trust each other, and are connected only by a telephone. The resource begins with a detailed explanation of the activity and...

Networks and the internet

Students would find this Computing at School community resource useful as a revision resource for the topics of networks and the internet. It is suitable to be issued as a sequence of homework tasks.

Network topologies - unplugged activity

A short unplugged activity. This uses string and various other props to enable students to simulate the various network topologies required for GCSE Computing. The activities lead naturally into discussions around protocols, data collisions and reliability. A large open area may be required depending on the size...

Networks Role Play -Packet Routing

This resource contains some rules for an unplugged networking activity to model how routers and networks deal with transmitting packets of data. The activity is designed for 6 people to act as routers, who apply the routing rules to packets of data. There are 4 end points which send and receive packets according to...

Computer Misuse Act and Cyber Crime

This resource contains a Lesson Plan centred on the Computer Misuse Act and the choices students might have to make with respect to the act and peer pressure. It helps make clear to students what activities are considered criminal ones with respect to the act as well as asking them to rank criminal activity online...

Data Security

In this resource, the students are asked to look at various aspects of data security. In part this covers cyber security but it also looks at data integrity and ensuring that users data does not become corrupt through various means. There are a variety of activities provided, and all of the necessary resources are...

Cyber Security Starter Activities

This resource consists of two starter activities, the Cyber Security Diamond asks students to take 9 statements relating to Cyber Security and rank them (in a diamond layout) from most to least important. The Social Engineering Activity contains four definitions of types of social engineering activity and asks...

System Security - Tarsia Creator

This resource contains two sets of triominoes, based around the theme of internet security. A simple set with only 4 cards, where three definitions and their key words need to be matched. The set also has two extra definitions and key words to act as distractors from the actual answers, an extension might be to get...

Pages

View all publishers