week 3

Learning Aims and Objectives:
Aim: In this week's page, students will learn .  

Objectives:
1. By the end of this week's page students will be able to 

2. By the end of the week's page students will be able to 

3. By the end of the week's page students will be able to 

4. By the end of the week's page students will be able to 

5. By the end of the week's page students will be able to 

 

1.3 The main features of threats to individuals and how it affects their victims

Individual Report Task: Explain the Main Features of Threats to Individuals

Task Overview

In this task, you will explain the main features of threats that target individuals, such as phishing, identity theft, and online scams. Your report should describe what makes these threats dangerous, how they work, and their potential impact on people.

Your report should be 200–300 words and include real-world examples where possible.


Title Page

Include your name, date, and a title (e.g., Explaining the Main Features of Threats to Individuals).


1. Define What a Threat to an Individual Is

Begin by explaining what is meant by threats to individuals.

  • These are cyber threats that target personal data, identity, or finances.

  • They often rely on human error, deception, or weak personal security practices.


2. Main Features of Threats to Individuals

List and describe several types of threats, focusing on their key features:

  • Phishing Emails and Messages

    • Feature: Pretend to be from trusted companies to steal login details or financial data.

    • Example: Fake emails claiming to be from banks or HMRC.

  • Identity Theft

    • Feature: Criminals steal personal information (e.g., name, address, National Insurance number) to open accounts or commit fraud.

    • Impact: Can damage credit scores and cause financial loss.

  • Online Scams

    • Feature: Fraudulent websites or offers trick individuals into paying money or sharing personal details.

    • Example: Fake shopping sites selling non-existent products.

  • Malware and Spyware

    • Feature: Malicious software secretly installed on a device, stealing data or monitoring activity.

    • Example: Keyloggers capturing passwords typed into a computer.

  • Weak Passwords and Credential Attacks

    • Feature: Attackers exploit reused or simple passwords to access personal accounts.

    • Example: Brute force attacks using automated tools.


3. Conclusion

Summarise why these threats are particularly dangerous to individuals.

Example:
"Threats to individuals often exploit trust, lack of awareness, or weak security practices. The main features include deception, stealing personal information, and financial fraud, all of which can cause lasting damage."


4. Additional Resources and Further Reading


Submission and Marking Criteria

Your report should be 200–300 words and show a clear understanding of threats aimed at individuals.

Coverage of Threats – Are different threats to individuals clearly explained?
Features Highlighted – Are the key features of each threat described?
Clarity and Examples – Is the report clear, structured, and supported with examples?


Final Note

This task will help you understand the main threats individuals face online and the features that make these threats effective against unsuspecting users.


Last Updated
2025-09-24 20:24:09

English and Maths

English


Maths


Stretch and Challenge

Stretch and Challenge


  • Fast to implement
  • Accessible by default
  • No dependencies
Homework

Homework


Equality and Diversity Calendar
How to's

How 2's Coverage




Links to Learning Outcomes

Links to Assessment criteria

 


Files that support this week


| | | | |
Week 2
Prev
Week 3
Prev
Week 4
Prev

Next