New
New
Year 11
OCR

Network security

I can explain why network security is important and describe methods used to protect networks.

New
New
Year 11
OCR

Network security

I can explain why network security is important and describe methods used to protect networks.

These resources will be removed by end of Summer Term 2025.

Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.

These resources were created for remote use during the pandemic and are not designed for classroom teaching.

Lesson details

Key learning points

  1. Networks need security to protect data, devices, and users from threats and attacks.
  2. A range of methods is used to protect networks and reduce the risk of attacks.

Keywords

  • Firewall - a system that filters network traffic to protect against unauthorised flows of data in or out of the network

  • User privileges - settings that control what actions a user is allowed to perform on a network

Common misconception

Network security just stops viruses, so it’s only important for large organisations, not for individuals or small businesses.

Network security protects all users, not just large organisations. It prevents data theft, fraud, and service disruption. Individuals need protection from threats like phishing or ransomware.


To help you plan your year 11 computer science lesson on: Network security, download all teaching resources for free and adapt to suit your pupils' needs...

Use relatable examples like someone hacking home Wi-Fi or stealing personal information from online accounts.
Teacher tip

Equipment

Licence

This content is © Oak National Academy Limited (2025), licensed on Open Government Licence version 3.0 except where otherwise stated. See Oak's terms & conditions (Collection 2).

Lesson video

Loading...

Prior knowledge starter quiz

Download quiz pdf

6 Questions

Q1.
What do we call a technique that manipulates people into giving away confidential information?

Correct Answer: social engineering

Q2.
Arrange these steps in a typical social engineering attack:

1 - target a user
2 - build trust or create urgency
3 - request confidential information
4 - use the information to access the network

Q3.
Match each keyword to its description:

Correct Answer:social engineering,manipulating people into giving away information

manipulating people into giving away information

Correct Answer:malware,software designed to harm or disrupt

software designed to harm or disrupt

Correct Answer:network attack,an attempt to access a network unlawfully

an attempt to access a network unlawfully

Correct Answer:phishing,tricking users with fake emails or sites

tricking users with fake emails or sites

Q4.
Which is most likely to be used in a malware attack?

security patch
password manager
Correct answer: virus
encryption tool

Q5.
Match the example to the correct threat:

Correct Answer:malware,a program that locks files and asks for payment

a program that locks files and asks for payment

Correct Answer:social engineering,a phone call pretending to be from IT support

a phone call pretending to be from IT support

Correct Answer:network attack,trying to guess a password repeatedly

trying to guess a password repeatedly

Correct Answer:phishing,an email with a fake link to a bank website

an email with a fake link to a bank website

Q6.
Which of these is NOT a form of social engineering?

shoulder surfing
tailgating
pretexting
Correct answer: installing antivirus

Assessment exit quiz

Download quiz pdf

6 Questions

Q1.
What is the main reason for having network security?

to make the internet faster
to update software automatically
Correct answer: to protect data, devices, and users from threats
to reduce electricity use

Q2.
Why is network security important for individuals and small businesses?

Only small organisations are targeted.
Correct answer: It reduces the risk and damage caused by threats like phishing or malware.
It’s not important for users in large businesses.
It speeds up the network.

Q3.
What is the name of a system that filters network traffic to block unauthorised access?

Correct Answer: firewall

Q4.
Match each keyword to its description:

Correct Answer:firewall,a system that filters network traffic

a system that filters network traffic

Correct Answer:user privileges,settings that control user actions

settings that control user actions

Correct Answer:data theft,unauthorised taking of information

unauthorised taking of information

Correct Answer:security update,software improvements to fix vulnerabilities

software improvements to fix vulnerabilities

Q5.
What is a common threat that network security aims to prevent?

Correct answer: data theft
faster downloads
cheaper hardware
quicker logins

Q6.
Arrange these steps for setting up user privileges:

1 - identify user roles
2 - decide what each role needs access to
3 - set permissions for each role
4 - review permissions regularly