Network security
I can explain why network security is important and describe methods used to protect networks.
Network security
I can explain why network security is important and describe methods used to protect networks.
These resources will be removed by end of Summer Term 2025.
Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.
These resources were created for remote use during the pandemic and are not designed for classroom teaching.
Lesson details
Key learning points
- Networks need security to protect data, devices, and users from threats and attacks.
- A range of methods is used to protect networks and reduce the risk of attacks.
Keywords
Firewall - a system that filters network traffic to protect against unauthorised flows of data in or out of the network
User privileges - settings that control what actions a user is allowed to perform on a network
Common misconception
Network security just stops viruses, so it’s only important for large organisations, not for individuals or small businesses.
Network security protects all users, not just large organisations. It prevents data theft, fraud, and service disruption. Individuals need protection from threats like phishing or ransomware.
To help you plan your year 11 computer science lesson on: Network security, download all teaching resources for free and adapt to suit your pupils' needs...
To help you plan your year 11 computer science lesson on: Network security, download all teaching resources for free and adapt to suit your pupils' needs.
The starter quiz will activate and check your pupils' prior knowledge, with versions available both with and without answers in PDF format.
We use learning cycles to break down learning into key concepts or ideas linked to the learning outcome. Each learning cycle features explanations with checks for understanding and practice tasks with feedback. All of this is found in our slide decks, ready for you to download and edit. The practice tasks are also available as printable worksheets and some lessons have additional materials with extra material you might need for teaching the lesson.
The assessment exit quiz will test your pupils' understanding of the key learning points.
Our video is a tool for planning, showing how other teachers might teach the lesson, offering helpful tips, modelled explanations and inspiration for your own delivery in the classroom. Plus, you can set it as homework or revision for pupils and keep their learning on track by sharing an online pupil version of this lesson.
Explore more key stage 4 computer science lessons from the The internet and web technologies unit, dive into the full secondary computer science curriculum, or learn more about lesson planning.
Equipment
Licence
Prior knowledge starter quiz
6 Questions
Q1.What do we call a technique that manipulates people into giving away confidential information?
Q2.Arrange these steps in a typical social engineering attack:
Q3.Match each keyword to its description:
manipulating people into giving away information
software designed to harm or disrupt
an attempt to access a network unlawfully
tricking users with fake emails or sites
Q4.Which is most likely to be used in a malware attack?
Q5.Match the example to the correct threat:
a program that locks files and asks for payment
a phone call pretending to be from IT support
trying to guess a password repeatedly
an email with a fake link to a bank website
Q6.Which of these is NOT a form of social engineering?
Assessment exit quiz
6 Questions
Q1.What is the main reason for having network security?
Q2.Why is network security important for individuals and small businesses?
Q3.What is the name of a system that filters network traffic to block unauthorised access?
Q4.Match each keyword to its description:
a system that filters network traffic
settings that control user actions
unauthorised taking of information
software improvements to fix vulnerabilities