New
New
Year 11
OCR

Defence against malware

I can describe how to defend against malware and suggest ways to improve security.

New
New
Year 11
OCR

Defence against malware

I can describe how to defend against malware and suggest ways to improve security.

These resources will be removed by end of Summer Term 2025.

Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.

These resources were created for remote use during the pandemic and are not designed for classroom teaching.

Lesson details

Key learning points

  1. Software can be designed and updated to prevent cyberattacks.
  2. Techniques like input sanitisation, modular testing and code reviews can be used to prevent cyberattacks.
  3. Encryption protects data by making it unreadable without the correct key.
  4. Strong passwords and two-factor authentication add important layers of security against unauthorised access.

Keywords

  • Cyberattack - a deliberate attempt to damage, disrupt or gain unauthorised access to computer systems, networks or data

  • Sanitisation - to check and clean user input to stop harmful code or to delete data to stop it being recovered or misused

  • Operating system - the main software that manages a computer’s hardware and allows other programs to run

  • Vulnerabilities - weaknesses in a system, software or network that can be exploited by attackers to gain unauthorised access, cause damage or steal data

Common misconception

Installing antivirus software is enough to fully protect my device from malware.

Antivirus software is helpful, but it’s only one part of a broader defence strategy. Full protection also requires regular software updates, strong passwords, safe browsing habits and user awareness to avoid phishing and suspicious downloads.


To help you plan your year 11 computer science lesson on: Defence against malware, download all teaching resources for free and adapt to suit your pupils' needs...

Give learners analogies with concepts and routines they will already understand in the real world. For example, installing antivirus software is like locking your front door, or updating software security is like getting a vaccine to protect you from viruses.
Teacher tip

Equipment

Licence

This content is © Oak National Academy Limited (2025), licensed on Open Government Licence version 3.0 except where otherwise stated. See Oak's terms & conditions (Collection 2).

Lesson video

Loading...

Prior knowledge starter quiz

Download quiz pdf

6 Questions

Q1.
Match the types of malware with their descriptions:
Correct Answer:virus,spreads by attaching itself to files or programs

spreads by attaching itself to files or programs

Correct Answer:worm,spreads automatically without user action

spreads automatically without user action

Correct Answer:trojan,disguises itself as a harmless or useful program

disguises itself as a harmless or useful program

Correct Answer:ransomware,locks files or systems and demands payment

locks files or systems and demands payment

Q2.
Which of these is a key way to recognise a phishing email?
It comes from a trusted sender.
Correct answer: It asks for personal information or contains suspicious links.
It includes an official company logo.
It only contains text, no attachments.
Q3.
What is the type of malware that displays unwanted advertisements and may collect user data?
Correct Answer: adware, ad ware
Q4.
What is spyware designed to do?
lock users out of their systems
encrypt files and demand payment
Correct answer: monitor user activity and steal sensitive information
display unwanted advertisements
Q5.
Arrange the steps of a malware infection in the correct order:
1 - the user downloads a file from a malicious website
2 - the malware installs itself on the system
3 - the malware begins to harm, steal or disrupt the system
4 - the user experiences issues like data loss or system failure
Q6.
What is the cybercrime that manipulates people into revealing confidential information by targeting human psychology?
Correct Answer: social engineering

Assessment exit quiz

Download quiz pdf

6 Questions

Q1.
Match the following terms with their definitions:
Correct Answer:sanitisation,checking and cleaning user input to prevent harmful code

checking and cleaning user input to prevent harmful code

Correct Answer:operating system,software that manages hardware and allows other programs to run

software that manages hardware and allows other programs to run

Correct Answer:vulnerabilities,weaknesses in a system that attackers can exploit

weaknesses in a system that attackers can exploit

Correct Answer:cyberattack,a deliberate attempt to damage or gain unauthorised access to systems

a deliberate attempt to damage or gain unauthorised access to systems

Q2.
What is the process of protecting data by making it unreadable without the correct key?
Correct Answer: encryption
Q3.
What is the process of checking and cleaning user input to prevent harmful code?
Correct Answer: sanitisation
Q4.
Which of the following is an example of a strong password?
password123
JohnSmith2025
12345678
Correct answer: P@ssw0rd!93
Q5.
Which of the following statements about antivirus software is true?
Correct answer: Antivirus software is helpful but must be combined with other security measures.
Antivirus software can prevent all types of cyberattacks.
Installing antivirus software is enough to fully protect a device from malware.
Antivirus software eliminates the need for strong passwords.
Q6.
Why is user training important for improving cybersecurity?
It reduces the need for strong passwords.
Correct answer: It helps users recognise phishing attempts and suspicious activity.
It eliminates the risk of malware infections entirely.
It ensures antivirus software is always effective.