Protecting networks from security threats
I can compare threats to the security of a computer system and suggest protective actions to take.
Protecting networks from security threats
I can compare threats to the security of a computer system and suggest protective actions to take.
These resources will be removed by end of Summer Term 2025.
Lesson details
Key learning points
- Threats to security can be compared by likelihood and impact.
- Protective measures are used to make it difficult for attackers to achieve their goals.
- Combinations of protective measures make computer systems more secure.
- Training users of a network about risks can help keep a network secure.
Keywords
Cybersecurity - the protection of computer systems from threats
Firewall - a security system that monitors and controls network communication
Common misconception
Using security measures will stop every cyber attack.
Security measures reduce the risk of cyber attacks but cannot stop all of them. New threats and advanced techniques can sometimes bypass even the best defenses.
To help you plan your year 9 computing lesson on: Protecting networks from security threats, download all teaching resources for free and adapt to suit your pupils' needs...
To help you plan your year 9 computing lesson on: Protecting networks from security threats, download all teaching resources for free and adapt to suit your pupils' needs.
The starter quiz will activate and check your pupils' prior knowledge, with versions available both with and without answers in PDF format.
We use learning cycles to break down learning into key concepts or ideas linked to the learning outcome. Each learning cycle features explanations with checks for understanding and practice tasks with feedback. All of this is found in our slide decks, ready for you to download and edit. The practice tasks are also available as printable worksheets and some lessons have additional materials with extra material you might need for teaching the lesson.
The assessment exit quiz will test your pupils' understanding of the key learning points.
Our video is a tool for planning, showing how other teachers might teach the lesson, offering helpful tips, modelled explanations and inspiration for your own delivery in the classroom. Plus, you can set it as homework or revision for pupils and keep their learning on track by sharing an online pupil version of this lesson.
Explore more key stage 3 computing lessons from the Introduction to cybersecurity unit, dive into the full secondary computing curriculum, or learn more about lesson planning.
Equipment
Licence
Starter quiz
6 Questions
spreads between computers and disrupts operations
spreads through networks and slows them down
disguised as a harmless program
Exit quiz
6 Questions
the protection of computer systems from threats
security system that monitors and controls network communication
deceiving people to steal personal information