week 3
Learning Aims and Objectives:
Aim: In this week's page, students will learn .
Objectives:
1. By the end of this week's page students will be able to
2. By the end of the week's page students will be able to
3. By the end of the week's page students will be able to
4. By the end of the week's page students will be able to
5. By the end of the week's page students will be able to
1.3 The main features of threats to individuals and how it affects their victims
Individual Report Task: Explain the Main Features of Threats to Individuals
Task Overview
In this task, you will explain the main features of threats that target individuals, such as phishing, identity theft, and online scams. Your report should describe what makes these threats dangerous, how they work, and their potential impact on people.
Your report should be 200–300 words and include real-world examples where possible.
Title Page
Include your name, date, and a title (e.g., Explaining the Main Features of Threats to Individuals).
1. Define What a Threat to an Individual Is
Begin by explaining what is meant by threats to individuals.
-
These are cyber threats that target personal data, identity, or finances.
-
They often rely on human error, deception, or weak personal security practices.
2. Main Features of Threats to Individuals
List and describe several types of threats, focusing on their key features:
-
Phishing Emails and Messages
-
Feature: Pretend to be from trusted companies to steal login details or financial data.
-
Example: Fake emails claiming to be from banks or HMRC.
-
-
Identity Theft
-
Feature: Criminals steal personal information (e.g., name, address, National Insurance number) to open accounts or commit fraud.
-
Impact: Can damage credit scores and cause financial loss.
-
-
Online Scams
-
Feature: Fraudulent websites or offers trick individuals into paying money or sharing personal details.
-
Example: Fake shopping sites selling non-existent products.
-
-
Malware and Spyware
-
Feature: Malicious software secretly installed on a device, stealing data or monitoring activity.
-
Example: Keyloggers capturing passwords typed into a computer.
-
-
Weak Passwords and Credential Attacks
-
Feature: Attackers exploit reused or simple passwords to access personal accounts.
-
Example: Brute force attacks using automated tools.
-
3. Conclusion
Summarise why these threats are particularly dangerous to individuals.
Example:
"Threats to individuals often exploit trust, lack of awareness, or weak security practices. The main features include deception, stealing personal information, and financial fraud, all of which can cause lasting damage."
4. Additional Resources and Further Reading
Submission and Marking Criteria
Your report should be 200–300 words and show a clear understanding of threats aimed at individuals.
Coverage of Threats – Are different threats to individuals clearly explained?
Features Highlighted – Are the key features of each threat described?
Clarity and Examples – Is the report clear, structured, and supported with examples?
Final Note
This task will help you understand the main threats individuals face online and the features that make these threats effective against unsuspecting users.
Last Updated
2025-09-24 20:24:09
English and Maths
English
Maths
Stretch and Challenge
Stretch and Challenge
- Fast to implement
- Accessible by default
- No dependencies
Homework
Homework
Equality and Diversity Calendar
How to's
How 2's Coverage
Links to Learning Outcomes |
Links to Assessment criteria |
|
|---|---|---|
Files that support this week
Week 2←
PrevWeek 3←
PrevWeek 4←
Prev→
Next