top of page
Paper 1: Testimonial
Image by ThisisEngineering RAEng

1. Introduction to Cyber-Security 

  • Explain the difference between data and information

  • Critique online services in relation to data privacy

  • Identify what happens to data entered online

  • Explain the need for the Data Protection Act

Topic 1 - You and your data

Image by Timothy Hales Bennett

2. Data and the risks associated with it

  • Recognise how human errors pose security risks to data

  • Implement strategies to minimise the risk of data being compromised through human error

Image by Ahmed Zayan

3. Methods of Hacking 

  • Define hacking in the context of cyber security

  • Explain how a DDoS attack can impact users of online services

  • Identify strategies to reduce the chance of a brute force attack being successful

  • Explain the need for the Computer Misuse Act

Topic 3 - Script kiddies

Image by Michael Geiger

4. Malware 

  • List the common malware threats

  • Examine how different types of malware causes problems for computer systems

  • Question how malicious bots can have an impact on societal issues

Topic 4 - Rise of the bots

Image by Patrick Assalé

5. Security threats 

  • Compare security threats against probability and the potential impact to organisations

  • Explain how networks can be protected from common security threats

Topic 5 - There’s no place like 127.0.0.1

Image by FLY:D

6. Preventing Cyber-attacks 

  • Identify the most effective methods to prevent cyberattacks

Topic 6 - Under Attack

Unit 14 - Cyber-Security

This unit will take you on an eye-opening journey of discovery about techniques used by cybercriminals to steal data, disrupt systems, and infiltrate networks. You will start by considering the value of their data to organisations and what they might use it for. You will then look at social engineering techniques used by cybercriminals to try to trick users into giving away their personal data. The unit will look at the more common cybercrimes such as hacking, DDoS attacks, and malware, as well as looking at methods to protect ourselves and our networks against these attacks.

Image by Glenn Carstens-Peters

7. End of unit assessment 

Assessment
Reflection

Assessment 

©2024 BY EDUCATION TOOLZ. 

  • Youtube
bottom of page