week 1

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

1.1 The basic nature of a cyber threat and where they happened.

Individual Report Task: Explain the Basic Nature of a Cyber Threat Using Examples

Task Overview

In this task, you will explain the basic nature of a cyber threat, considering what a threat is, how it works, and the potential impact it can have on individuals and organisations. Your report should include examples of common cyber threats to show how they appear in the real world.

Your report should be 200 to 300 words and provide clear explanations using examples.


Title Page

Include your name, date, and a title (e.g., Explaining the Basic Nature of Cyber Threats with Examples).


1. Define the Basic Nature of a Cyber Threat

Start by explaining what a cyber threat is.

  • A cyber threat is any activity or event that has the potential to harm digital systems, steal data, or disrupt services.

  • Threats can be caused by malicious actors (hackers, criminals), accidents (human error), or even natural causes (power outages affecting systems).


2. Examples of Common Cyber Threats

Provide short explanations with real world examples:

  • Phishing

    • Attackers send fraudulent emails or messages pretending to be from trusted organisations.

    • Example: A fake email from a bank asking users to click a link and enter their login details.

  • Malware (Viruses, Worms, Trojans)

    • Malicious software designed to damage systems or steal data.

    • Example: The WannaCry ransomware attack (2017) that encrypted NHS files and demanded payment.

  • Denial of Service (DoS) and Distributed Denial of Service (DDoS)

    • Attackers flood a system or website with traffic until it crashes.

    • Example: DDoS attacks on gaming platforms like PlayStation Network.

  • Password Attacks (Brute Force/Dictionary)

    • Attackers use automated tools to guess weak or reused passwords.

    • Example: Credential stuffing attacks on accounts with simple or repeated passwords.


3. Conclusion

Summarise the nature of cyber threats and their impact.

Example:
"Cyber threats aim to exploit weaknesses in systems, people, or processes. They range from phishing emails and malware infections to large scale attacks such as ransomware. Understanding these threats is the first step towards preventing them."


4. Additional Resources and Further Reading


Submission and Marking Criteria

Your report should be 200 to 300 words and show a clear understanding of cyber threats with relevant examples.

Definition of a Cyber Threat  Is the basic nature of a cyber threat clearly explained?
Examples Provided  Are real world examples included to illustrate understanding?
Presentation and Clarity  Is the report clear, well structured, and in good English?


Final Note

This task will help you understand what cyber threats are, how they work, and the risks they pose to both individuals and organisations. Using examples makes it easier to connect theory to real world events.


Last Updated
2025-09-24 20:12:27

English and Maths

English


Maths


Stretch and Challenge

Stretch and Challenge


  • Fast to implement
  • Accessible by default
  • No dependencies
Homework

Homework


Equality and Diversity Calendar
How to's

How 2's Coverage




Links to Learning Outcomes

Links to Assessment criteria

 


Files that support this week


| | | | |
Week 1
Prev
Week 2
Prev

Next