New
New
Year 11
AQA

Threats to networks

I can identify potential threats to a network and explain the different types of network attacks.

New
New
Year 11
AQA

Threats to networks

I can identify potential threats to a network and explain the different types of network attacks.

These resources will be removed by end of Summer Term 2025.

Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.

These resources were created for remote use during the pandemic and are not designed for classroom teaching.

Lesson details

Key learning points

  1. A range of potential threats can affect the security and performance of a network.
  2. Network attacks can take different forms, each using specific techniques.

Keywords

  • Social engineering - techniques used to trick users into giving away personal information by manipulating their behaviour or emotions

  • Malware - malicious software designed to cause damage to computer systems, corrupt or change files, steal data, or cause disruption to services

Common misconception

Network threats and attacks come only from external hackers or from sources outside a network, while internal users or trusted software pose no risk.

Threats can be internal, like careless employees or malicious insiders, as well as external.


To help you plan your year 11 computer science lesson on: Threats to networks, download all teaching resources for free and adapt to suit your pupils' needs...

Use current news headlines about data breaches or cyberattacks to make threats tangible for students.
Teacher tip

Equipment

Licence

This content is © Oak National Academy Limited (2025), licensed on Open Government Licence version 3.0 except where otherwise stated. See Oak's terms & conditions (Collection 2).

Lesson video

Loading...

Prior knowledge starter quiz

Download quiz pdf

6 Questions

Q1.
Match each process to its action.

Correct Answer:Search engine uses algorithms.,Sorts and displays results.

Sorts and displays results.

Correct Answer:Web crawler scans sites.,Gathers information.

Gathers information.

Correct Answer:SEO strategies are applied.,Improves site ranking.

Improves site ranking.

Q2.
What does SEO stand for?

Correct Answer: Search engine optimisation, Search engine optimization

Q3.
What is the main goal of algorithms in search engines?

to make websites look better
Correct answer: to find and deliver the most useful results
to slow down searches
to remove advertisements

Q4.
Match each keyword to its definition.

Correct Answer:client-side processing,Code runs on the user’s device.

Code runs on the user’s device.

Correct Answer:server-side processing,Code runs on a web server.

Code runs on a web server.

Correct Answer:web crawler,collects website data for search engines

collects website data for search engines

Correct Answer:search engine optimisation,improves a website’s search ranking

improves a website’s search ranking

Q5.
When you click a link and new content appears without reloading the whole page, which processing is most likely involved?

manual processing
batch processing
server-side processing
Correct answer: client-side processing

Q6.
Order the steps for processing a form on a website using server-side processing.

1 - User fills out the form.
2 - Form data is sent to the server.
3 - Server processes the data.
4 - User receives a response.

Assessment exit quiz

Download quiz pdf

6 Questions

Q1.
What is social engineering in the context of network security?

installing antivirus software
upgrading network hardware
Correct answer: manipulating people into revealing confidential information
encrypting data

Q2.
Name the type of software designed to cause damage, steal data, or disrupt computer systems.

Correct Answer: Malware

Q3.
Put these steps in order for a typical malware attack.

1 - User clicks on a suspicious link.
2 - Malware is downloaded.
3 - System is infected.
4 - Data is stolen or disrupted.

Q4.
What is a potential internal network threat?

Correct answer: a careless employee sharing passwords
a power cut
a new router installation
a software update

Q5.
Put these actions in order for a phishing attack:.

1 - Attacker sends a fake email.
2 - User receives the email.
3 - User enters personal details.
4 - Attacker collects the information.

Q6.
Match each keyword to its description.

Correct Answer:social engineering,manipulation to trick users into giving information

manipulation to trick users into giving information

Correct Answer:malware,malicious software that causes harm

malicious software that causes harm

Correct Answer:internal threat,attacks or risks from within an organisation

attacks or risks from within an organisation

Correct Answer:external threat,attacks or risks from outside an organisation

attacks or risks from outside an organisation