GCSE
Lesson 3 Be suspicious part 2 - Automated cybercrime
This lesson builds on the previous one, which was about non-automated cybercrime, to enable learners to distinguish between non-automated and automated cybercrime. Learners will begin to understand terms and techniques related to automated cybercrime and the vulnerabilities in a network or software that make companies or individuals vulnerable to such attacks.
Learning objectives
- Describe automated forms of cyberattack
- Analyse a real cyberattack and identify the network or software weaknesses that enabled it to happen
Career video to support the unit
Veno Senthil
Technical Support Manager at Cisco
Computer Science can propel students into fulfilling careers of the future. In this video, Veno Senthil, Technical Support Manager at Cisco, explains the topic of cyber security and how she uses it in her day-to-day role.
Package contents
- Lesson plans
- Learning graphs
- Unit overviews
- Activities
Not registered yet?
Create an account and get access to over 500 hours of free teaching resources.
GCSE revision
A comprehensive range of content and helpful practice questions are also available for this topic.