week 2
Learning Aims and Objectives:
Aim: In this week's page, students will learn .
Objectives:
1. By the end of this week's page students will be able to
2. By the end of the week's page students will be able to
3. By the end of the week's page students will be able to
4. By the end of the week's page students will be able to
5. By the end of the week's page students will be able to
1.2 common threats
Fraud and financial crime
Terrorist related
Extortion
Warfare
Viruses/malware
Denial of Service
Spam, phishing etc
Obscenity
Harassment/trolling/bullying
Trafficking
Individual Report Task: List Some of the More Common Threats
Task Overview
In this task, you will list and describe some of the more common cyber threats faced by individuals and organisations. Your report should provide short explanations of how these threats work and what risks they pose.
Your report should be 200–300 words and give clear, easy-to-understand examples.
Title Page
Include your name, date, and a title (e.g., Listing Some of the More Common Cyber Threats).
1. Define What a Cyber Threat Is
Begin by briefly explaining what is meant by a cyber threat.
-
A cyber threat is an attempt to damage, disrupt, or gain unauthorised access to computer systems, networks, or data.
-
Threats can target individuals, businesses, or governments and may be caused by cyber criminals, insiders, or even accidental actions.
2. List of Common Cyber Threats
Provide a list of at least five common threats, with a short description for each:
-
Phishing
-
Fake emails or messages tricking people into sharing personal details or clicking harmful links.
-
-
Malware
-
Malicious software (e.g., viruses, trojans, spyware) that damages systems or steals data.
-
-
Ransomware
-
Locks or encrypts files until a ransom is paid. Example: The WannaCry attack on the NHS.
-
-
Denial-of-Service (DoS/DDoS)
-
Overloads a website or service with traffic until it crashes.
-
-
Password Attacks
-
Includes brute force or dictionary attacks to guess weak passwords.
-
-
Insider Threats
-
Employees or contractors misusing their access to cause harm or steal information.
-
3. Conclusion
Summarise the importance of recognising common threats.
Example:
"Common cyber threats like phishing, malware, and ransomware are constantly evolving, but awareness of these threats allows individuals and organisations to prepare better defences and reduce the risk of attack."
4. Additional Resources and Further Reading
Submission and Marking Criteria
Your report should be 200–300 words and show knowledge of common cyber threats with clear examples.
Coverage of Threats – Are multiple threats described clearly?
Accuracy – Are the explanations correct and realistic?
Clarity – Is the report clear, structured, and in good English?
Final Note
This task will help you recognise the most common threats in cyber security and build awareness of how they impact individuals and organisations.
Last Updated
2025-09-24 20:18:55
English and Maths
English
Maths
Stretch and Challenge
Stretch and Challenge
- Fast to implement
- Accessible by default
- No dependencies
Homework
Homework
Equality and Diversity Calendar
How to's
How 2's Coverage
Links to Learning Outcomes |
Links to Assessment criteria |
|
|---|---|---|
Files that support this week
Week 1←
PrevWeek 2←
PrevWeek 3←
Prev→
Next