In this lesson, we will explore the difference between cybersecurity and network security and understand that although networks are wonderful inventions, they can make an organisation vulnerable to attack. Through interactive activities we will gain a sense of the size of the problem and learn how important it is that we understand a hacker's motivation and take the subject seriously.
Unit Overview: Security
In this lesson, we will distinguish between non-automated and automated cybercrime. We will be introduced to the idea that humans are the weakest link in the security chain before exploring different types of social engineering.
In this lesson, we will explore terms and techniques related to automated cybercrime and the vulnerabilities of a network or software that can make companies or individuals vulnerable to such attacks.
In this lesson, we will discover different ways to protect software systems. This will include approaches to design and approaches to access.
In this lesson, we will find out about ways to protect network systems from cybercrime. We will learn about the importance of network security before looking at a number of ways to achieve network security.
In this lesson, we will begin to understand how companies can and do test their own vulnerability to cybercrime.
In this lesson, we will explore different careers available in cybersecurity before taking an end of unit quiz.
Units in Computing
- Data Representation
- Computer Systems
- Impacts on society
- Programming 1: Sequence
- Programming 2: Selection
- Programming 3: Iteration
- Programming 4: Subroutines
- Programming 5: Strings and lists
- Programming 6: Dictionaries and datafiles
- Databases and SQL
- Object-oriented programming