Skip to main content

GCSE

Lesson 3 Be suspicious part 2 - Automated cybercrime

Curriculum > KS4 > Unit > Lesson

This lesson builds on the previous one, which was about non-automated cybercrime, to enable learners to distinguish between non-automated and automated cybercrime. Learners will begin to understand terms and techniques related to automated cybercrime and the vulnerabilities in a network or software that make companies or individuals vulnerable to such attacks.

Learning objectives

  • Describe automated forms of cyberattack
  • Analyse a real cyberattack and identify the network or software weaknesses that enabled it to happen

Package contents

  • Lesson plans
  • Learning graphs
  • Unit overviews
  • Activities
Log in to download

Not registered yet?

Create an account and get access to over 500 hours of free teaching resources.

Help us make these resources better

Provide your feedback

Or email us at info@teachcomputing.org