Threats to networks
I can identify potential threats to a network and explain the different types of network attacks.
Threats to networks
I can identify potential threats to a network and explain the different types of network attacks.
These resources will be removed by end of Summer Term 2025.
Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.
These resources were created for remote use during the pandemic and are not designed for classroom teaching.
Lesson details
Key learning points
- A range of potential threats can affect the security and performance of a network.
- Network attacks can take different forms, each using specific techniques.
Keywords
Social engineering - techniques used to trick users into giving away personal information by manipulating their behaviour or emotions
Malware - malicious software designed to cause damage to computer systems, corrupt or change files, steal data, or cause disruption to services
Common misconception
Network threats and attacks come only from external hackers or from sources outside a network, while internal users or trusted software pose no risk.
Threats can be internal, like careless employees or malicious insiders, as well as external.
To help you plan your year 11 computer science lesson on: Threats to networks, download all teaching resources for free and adapt to suit your pupils' needs...
To help you plan your year 11 computer science lesson on: Threats to networks, download all teaching resources for free and adapt to suit your pupils' needs.
The starter quiz will activate and check your pupils' prior knowledge, with versions available both with and without answers in PDF format.
We use learning cycles to break down learning into key concepts or ideas linked to the learning outcome. Each learning cycle features explanations with checks for understanding and practice tasks with feedback. All of this is found in our slide decks, ready for you to download and edit. The practice tasks are also available as printable worksheets and some lessons have additional materials with extra material you might need for teaching the lesson.
The assessment exit quiz will test your pupils' understanding of the key learning points.
Our video is a tool for planning, showing how other teachers might teach the lesson, offering helpful tips, modelled explanations and inspiration for your own delivery in the classroom. Plus, you can set it as homework or revision for pupils and keep their learning on track by sharing an online pupil version of this lesson.
Explore more key stage 4 computer science lessons from the The internet and web technologies unit, dive into the full secondary computer science curriculum, or learn more about lesson planning.
Equipment
Licence
Prior knowledge starter quiz
6 Questions
Q1.Match each process to its action.
Sorts and displays results.
Gathers information.
Improves site ranking.
Q2.What does SEO stand for?
Q3.What is the main goal of algorithms in search engines?
Q4.Match each keyword to its definition.
Code runs on the user’s device.
Code runs on a web server.
collects website data for search engines
improves a website’s search ranking
Q5.When you click a link and new content appears without reloading the whole page, which processing is most likely involved?
Q6.Order the steps for processing a form on a website using server-side processing.
Assessment exit quiz
6 Questions
Q1.What is social engineering in the context of network security?
Q2.Name the type of software designed to cause damage, steal data, or disrupt computer systems.
Q3.Put these steps in order for a typical malware attack.
Q4.What is a potential internal network threat?
Q5.Put these actions in order for a phishing attack:.
Q6.Match each keyword to its description.
manipulation to trick users into giving information
malicious software that causes harm
attacks or risks from within an organisation
attacks or risks from outside an organisation