Week 1 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

1.1 The basic nature of a cyber threat and where they happened.

Individual Report Task: Explain the Basic Nature of a Cyber Threat Using Examples

Task Overview

In this task, you will explain the basic nature of a cyber threat, considering what a threat is, how it works, and the potential impact it can have on individuals and organisations. Your report should include examples of common cyber threats to show how they appear in the real world.

Your report should be 200 to 300 words and provide clear explanations using examples.


Title Page

Include your name, date, and a title (e.g., Explaining the Basic Nature of Cyber Threats with Examples).


1. Define the Basic Nature of a Cyber Threat

Start by explaining what a cyber threat is.

  • A cyber threat is any activity or event that has the potential to harm digital systems, steal data, or disrupt services.

  • Threats can be caused by malicious actors (hackers, criminals), accidents (human error), or even natural causes (power outages affecting systems).


2. Examples of Common Cyber Threats

Provide short explanations with real world examples:

  • Phishing

    • Attackers send fraudulent emails or messages pretending to be from trusted organisations.

    • Example: A fake email from a bank asking users to click a link and enter their login details.

  • Malware (Viruses, Worms, Trojans)

    • Malicious software designed to damage systems or steal data.

    • Example: The WannaCry ransomware attack (2017) that encrypted NHS files and demanded payment.

  • Denial of Service (DoS) and Distributed Denial of Service (DDoS)

    • Attackers flood a system or website with traffic until it crashes.

    • Example: DDoS attacks on gaming platforms like PlayStation Network.

  • Password Attacks (Brute Force/Dictionary)

    • Attackers use automated tools to guess weak or reused passwords.

    • Example: Credential stuffing attacks on accounts with simple or repeated passwords.


3. Conclusion

Summarise the nature of cyber threats and their impact.

Example:
"Cyber threats aim to exploit weaknesses in systems, people, or processes. They range from phishing emails and malware infections to large scale attacks such as ransomware. Understanding these threats is the first step towards preventing them."


4. Additional Resources and Further Reading


Submission and Marking Criteria

Your report should be 200 to 300 words and show a clear understanding of cyber threats with relevant examples.

Definition of a Cyber Threat  Is the basic nature of a cyber threat clearly explained?
Examples Provided  Are real world examples included to illustrate understanding?
Presentation and Clarity  Is the report clear, well structured, and in good English?


Final Note

This task will help you understand what cyber threats are, how they work, and the risks they pose to both individuals and organisations. Using examples makes it easier to connect theory to real world events.


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 2 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

1.2 common threats

Fraud and financial crime

Terrorist related

Extortion

Warfare

 Viruses/malware

Denial of Service

Spam, phishing etc

Obscenity

Harassment/trolling/bullying

Trafficking

Individual Report Task: List Some of the More Common Threats

Task Overview

In this task, you will list and describe some of the more common cyber threats faced by individuals and organisations. Your report should provide short explanations of how these threats work and what risks they pose.

Your report should be 200–300 words and give clear, easy-to-understand examples.


Title Page

Include your name, date, and a title (e.g., Listing Some of the More Common Cyber Threats).


1. Define What a Cyber Threat Is

Begin by briefly explaining what is meant by a cyber threat.

  • A cyber threat is an attempt to damage, disrupt, or gain unauthorised access to computer systems, networks, or data.

  • Threats can target individuals, businesses, or governments and may be caused by cyber criminals, insiders, or even accidental actions.


2. List of Common Cyber Threats

Provide a list of at least five common threats, with a short description for each:

  • Phishing

    • Fake emails or messages tricking people into sharing personal details or clicking harmful links.

  • Malware

    • Malicious software (e.g., viruses, trojans, spyware) that damages systems or steals data.

  • Ransomware

    • Locks or encrypts files until a ransom is paid. Example: The WannaCry attack on the NHS.

  • Denial-of-Service (DoS/DDoS)

    • Overloads a website or service with traffic until it crashes.

  • Password Attacks

    • Includes brute force or dictionary attacks to guess weak passwords.

  • Insider Threats

    • Employees or contractors misusing their access to cause harm or steal information.


3. Conclusion

Summarise the importance of recognising common threats.

Example:
"Common cyber threats like phishing, malware, and ransomware are constantly evolving, but awareness of these threats allows individuals and organisations to prepare better defences and reduce the risk of attack."


4. Additional Resources and Further Reading


Submission and Marking Criteria

Your report should be 200–300 words and show knowledge of common cyber threats with clear examples.

Coverage of Threats – Are multiple threats described clearly?
Accuracy – Are the explanations correct and realistic?
Clarity – Is the report clear, structured, and in good English?


Final Note

This task will help you recognise the most common threats in cyber security and build awareness of how they impact individuals and organisations.


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 3 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

1.3 The main features of threats to individuals and how it affects their victims

Individual Report Task: Explain the Main Features of Threats to Individuals

Task Overview

In this task, you will explain the main features of threats that target individuals, such as phishing, identity theft, and online scams. Your report should describe what makes these threats dangerous, how they work, and their potential impact on people.

Your report should be 200–300 words and include real-world examples where possible.


Title Page

Include your name, date, and a title (e.g., Explaining the Main Features of Threats to Individuals).


1. Define What a Threat to an Individual Is

Begin by explaining what is meant by threats to individuals.

  • These are cyber threats that target personal data, identity, or finances.

  • They often rely on human error, deception, or weak personal security practices.


2. Main Features of Threats to Individuals

List and describe several types of threats, focusing on their key features:

  • Phishing Emails and Messages

    • Feature: Pretend to be from trusted companies to steal login details or financial data.

    • Example: Fake emails claiming to be from banks or HMRC.

  • Identity Theft

    • Feature: Criminals steal personal information (e.g., name, address, National Insurance number) to open accounts or commit fraud.

    • Impact: Can damage credit scores and cause financial loss.

  • Online Scams

    • Feature: Fraudulent websites or offers trick individuals into paying money or sharing personal details.

    • Example: Fake shopping sites selling non-existent products.

  • Malware and Spyware

    • Feature: Malicious software secretly installed on a device, stealing data or monitoring activity.

    • Example: Keyloggers capturing passwords typed into a computer.

  • Weak Passwords and Credential Attacks

    • Feature: Attackers exploit reused or simple passwords to access personal accounts.

    • Example: Brute force attacks using automated tools.


3. Conclusion

Summarise why these threats are particularly dangerous to individuals.

Example:
"Threats to individuals often exploit trust, lack of awareness, or weak security practices. The main features include deception, stealing personal information, and financial fraud, all of which can cause lasting damage."


4. Additional Resources and Further Reading


Submission and Marking Criteria

Your report should be 200–300 words and show a clear understanding of threats aimed at individuals.

Coverage of Threats – Are different threats to individuals clearly explained?
Features Highlighted – Are the key features of each threat described?
Clarity and Examples – Is the report clear, structured, and supported with examples?


Final Note

This task will help you understand the main threats individuals face online and the features that make these threats effective against unsuspecting users.


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 4 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

1.4 The main features of threats to companies


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 5 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

1.5 The variety of threats for an audience


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 6 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

2.1 What are the motivations of people behind threats


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 7 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

2.3 How the features of threats make them operate

 


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 8 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

2.4 How attacks on companies are designed to work


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 9 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

2.5 Threats in terms of their hierarchy of damage


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 10 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

3.1 The impact on the economy of cyber threats


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 11 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

3.2 The levels of threat to my home environment

 


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 12 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

3.3 The threats to a website in a safe and controlled environment


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 13 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

3.4 The threat to a server in a safe and controlled environment

 


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →
Week 14 T&L Activities:

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

3.5 The create and present their findings and recommendations (End of Unit)


Files that support this week

English:

Assessment:


Learning Outcomes:
Awarding Organisation Criteria:
Maths:
Stretch and Challenge:
E&D / BV
Homework / Extension:
ILT
  →  →  →  →  →  →