week 2

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

1.2 common threats

Fraud and financial crime

Terrorist related

Extortion

Warfare

 Viruses/malware

Denial of Service

Spam, phishing etc

Obscenity

Harassment/trolling/bullying

Trafficking

Individual Report Task: List Some of the More Common Threats

Task Overview

In this task, you will list and describe some of the more common cyber threats faced by individuals and organisations. Your report should provide short explanations of how these threats work and what risks they pose.

Your report should be 200–300 words and give clear, easy-to-understand examples.


Title Page

Include your name, date, and a title (e.g., Listing Some of the More Common Cyber Threats).


1. Define What a Cyber Threat Is

Begin by briefly explaining what is meant by a cyber threat.

  • A cyber threat is an attempt to damage, disrupt, or gain unauthorised access to computer systems, networks, or data.

  • Threats can target individuals, businesses, or governments and may be caused by cyber criminals, insiders, or even accidental actions.


2. List of Common Cyber Threats

Provide a list of at least five common threats, with a short description for each:

  • Phishing

    • Fake emails or messages tricking people into sharing personal details or clicking harmful links.

  • Malware

    • Malicious software (e.g., viruses, trojans, spyware) that damages systems or steals data.

  • Ransomware

    • Locks or encrypts files until a ransom is paid. Example: The WannaCry attack on the NHS.

  • Denial-of-Service (DoS/DDoS)

    • Overloads a website or service with traffic until it crashes.

  • Password Attacks

    • Includes brute force or dictionary attacks to guess weak passwords.

  • Insider Threats

    • Employees or contractors misusing their access to cause harm or steal information.


3. Conclusion

Summarise the importance of recognising common threats.

Example:
"Common cyber threats like phishing, malware, and ransomware are constantly evolving, but awareness of these threats allows individuals and organisations to prepare better defences and reduce the risk of attack."


4. Additional Resources and Further Reading


Submission and Marking Criteria

Your report should be 200–300 words and show knowledge of common cyber threats with clear examples.

Coverage of Threats – Are multiple threats described clearly?
Accuracy – Are the explanations correct and realistic?
Clarity – Is the report clear, structured, and in good English?


Final Note

This task will help you recognise the most common threats in cyber security and build awareness of how they impact individuals and organisations.


Last Updated
2025-09-24 20:18:55

English and Maths

English


Maths


Stretch and Challenge

Stretch and Challenge


  • Fast to implement
  • Accessible by default
  • No dependencies
Homework

Homework


Equality and Diversity Calendar
How to's

How 2's Coverage




Links to Learning Outcomes

Links to Assessment criteria

 


Files that support this week


| | | | |
Week 1
Prev
Week 2
Prev
Week 3
Prev

Next