top of page
Paper 1: Testimonial

2. Data and the risks associated with it
-
Recognise how human errors pose security risks to data
-
Implement strategies to minimise the risk of data being compromised through human error
Topic 2 - Social engineering

3. Methods of Hacking
-
Define hacking in the context of cyber security
-
Explain how a DDoS attack can impact users of online services
-
Identify strategies to reduce the chance of a brute force attack being successful
-
Explain the need for the Computer Misuse Act
Topic 3 - Script kiddies
Unit 14 - Cyber-Security
This unit will take you on an eye-opening journey of discovery about techniques used by cybercriminals to steal data, disrupt systems, and infiltrate networks. You will start by considering the value of their data to organisations and what they might use it for. You will then look at social engineering techniques used by cybercriminals to try to trick users into giving away their personal data. The unit will look at the more common cybercrimes such as hacking, DDoS attacks, and malware, as well as looking at methods to protect ourselves and our networks against these attacks.

7. End of unit assessment
Assessment
bottom of page




