OCR GCSE Computer Science Lesson: Identifying and Preventing Vulnerabilities

This is a complete lesson on how to identify and prevent network threats/vulnerabilities (for OCR GCSE 9-1 1.6).

This resource features a full powerpoint presentation lesson that includes a starter and necessary information about each way to identify/prevent a vulnerability. This includes:

  • Penetration Testing (including information on black-box and white-box attacks)
  • Network Forensics (including “catch-it-as-you-can” and “stop, look and listen”)
  • Network Policies
  • Anti-Malware Software
  • Firewalls
  • User Access Levels
  • Encryption
  • Passwords

There are questions on some slides for class discussion about that specific identification/prevention technique.

As well as that, there are 2 worksheets for students to fill in - this is to consolidate their knowledge. Most answers for the worksheets are in the powerpoint and some others require commons sense. I like to go through the answers with my class so that we can have a discussion. An exam-styled 8 mark question is included; I think these are very important as they can be the difference between a grade. I included the mark scheme for each worksheet if you like to give your students the mark scheme so that they can self-assess.

If you have any inquiries, suggestions or criticisms you can send an email to helenamat69(at)gmail.com
Copyright information is included within the resource.

$3.16
Save for later
  • Whole-Lesson(s).pptx
  • Identifying-and-Preventing-Vulnerabilities-1.docx
  • Identifying-and-Preventing-Vulnerabilities-2.docx
  • Tier-3-(Extension)---Anti-malware-software.docx
  • Identifying-and-Preventing-Vulnerabilities-1-Mark-Scheme.docx
  • Identifying-and-Preventing-Vulnerabilities-2-Mark-Scheme.docx
  • Tier-3-(Extension)---Anti-malware-software-Mark-Scheme.docx

About this resource

Info

Created: May 26, 2019

Presentation

pptx, 9 MB

Whole-Lesson(s)

Worksheet

docx, 31 KB

Identifying-and-Preventing-Vulnerabilities-1

Worksheet

docx, 31 KB

Identifying-and-Preventing-Vulnerabilities-2

Report a problem

Tes Paid Licence

How can I re-use this?