icon-background-square
New
New
Year 9

Protecting networks from security threats

I can compare threats to the security of a computer system and suggest protective actions to take.

icon-background-square
New
New
Year 9

Protecting networks from security threats

I can compare threats to the security of a computer system and suggest protective actions to take.

warning

These resources will be removed by end of Summer Term 2025.

Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.

Lesson details

Key learning points

  1. Threats to security can be compared by likelihood and impact.
  2. Protective measures are used to make it difficult for attackers to achieve their goals.
  3. Combinations of protective measures make computer systems more secure.
  4. Training users of a network about risks can help keep a network secure.

Keywords

  • Cybersecurity - the protection of computer systems from threats

  • Firewall - a security system that monitors and controls network communication

Common misconception

Using security measures will stop every cyber attack.

Security measures reduce the risk of cyber attacks but cannot stop all of them. New threats and advanced techniques can sometimes bypass even the best defenses.


To help you plan your year 9 computing lesson on: Protecting networks from security threats, download all teaching resources for free and adapt to suit your pupils' needs...

Analogies are a good way of helping pupils understand the way that technology operates. For example, a firewall could be likened to leaving doors of a house open or locked.
speech-bubble
Teacher tip
equipment-required

Equipment

copyright

Licence

This content is © Oak National Academy Limited (2025), licensed on Open Government Licence version 3.0 except where otherwise stated. See Oak's terms & conditions (Collection 2).

Lesson video

Loading...

6 Questions

Q1.
What is the main risk of storing data electronically?
It takes up physical space.
It cannot be shared easily.
Correct answer: It is vulnerable to theft.
It is difficult to organise.
Q2.
What is the difference between data and information?
Data is meaningful, whereas information is raw facts.
Correct answer: Data is unprocessed, whereas information has structure or meaning.
Data is always numeric, whereas information is always text.
Data and information are the same.
Q3.
What is malware?
Correct answer: software designed to gain access to a computer to cause problems
software designed to protect computers
a type of hardware used in networks
a tool for improving system performance
Q4.
Which of the following is a type of malware?
firewall
Correct answer: trojan
router
antivirus
Q5.
Match the malware type to its description.
Correct Answer:virus,spreads between computers and disrupts operations
tick

spreads between computers and disrupts operations

Correct Answer:worm,spreads through networks and slows them down
tick

spreads through networks and slows them down

Correct Answer:trojan,disguised as a harmless program
tick

disguised as a harmless program

Q6.
What is the purpose of the Data Protection Act 2018?
to protect computers from viruses
to prevent online shopping fraud
to monitor internet browsing habits
Correct answer: to govern how personal data is collected, processed, stored and used

6 Questions

Q1.
Match the concept to its description.
Correct Answer:cybersecurity,the protection of computer systems from threats
tick

the protection of computer systems from threats

Correct Answer:firewall,security system that monitors and controls network communication
tick

security system that monitors and controls network communication

Correct Answer:phishing,deceiving people to steal personal information
tick

deceiving people to steal personal information

Q2.
Which of the following is an example of social engineering?
installing antivirus software
creating a secure password
using a firewall to monitor a network
Correct answer: sending a phishing email to trick someone into sharing personal information
Q3.
How does user training improve network security?
It reduces the cost of cybersecurity measures.
It eliminates all risks of cyber attacks.
Correct answer: It helps users recognise and avoid potential threats.
It improves the speed of the network.
Q4.
Why can’t security measures stop all cyber attacks?
Correct answer: Attackers continuously develop new techniques.
Security measures are too expensive.
Most security measures are outdated.
Security measures only work on specific devices.
Q5.
What is the main purpose of combining security measures?
to make systems faster
Correct answer: to reduce the risk of successful attacks
to eliminate the need for user training
to comply with legal requirements
Q6.
What is the impact of human error on data security?
It has no significant impact.
It only affects physical security.
It makes networks slower.
Correct answer: It is a major risk that attackers exploit.