Lesson Element Unit 3: Cyber Security Instructions and answers for tutors

advertisement

Lesson Element

Unit 3: Cyber Security

Software controls used with digital systems

Instructions and answers for tutors

These instructions cover the learner activity section which can be found on page 4 . This

Lesson Element supports Cambridge Technicals in IT Level 3 in IT.

When distributing the activity section to the learners either as a printed copy or as a

Word file you will need to remove the tutor instructions section.

The activity

In this Lesson Element the learners are tasked with recommending software controls that an organisation should use to secure their data. They can present their work in the form of a user guide for staff at the organisation.

Suggested timings

Activity 1: 5 minutes

Activity 2: 30 Minutes

Activity 3: 5 Minutes

Activity 4: 5 Minutes

Activity 5: 5 Minutes

Activity 6: 10 Minutes

Activity 7: 15 Minutes

Activity 8: 15 Minutes

ABC – This activity offers an opportunity for English skills development.

WORK – This activity offers an opportunity for work experience.

Version 1

Activity 1

Begin by introducing your learners to the term software controls.

Your explanation should make reference to software that can be applied to protect software, for example antimalware, firewalls and patches. You should also make reference to procedures that should be followed to prevent software from being compromised, such as password management.

Ask your learners to make notes and to ask you any questions that they might have regarding your explanation.

Activity 2

Show the learners the following short video. https://www.youtube.com/watch?v=7Kq1bBxUqLM

This video produced by CompTIA, presents a short introduction (4 minutes) to anti-malware software.

Activity 3

Show the learners the following video (30 minutes) https://www.youtube.com/watch?v=XEqnE_sDzSk

This video presents an overview of firewalls and network security.

Activity 4

Show the learners the following short video (2 minutes). https://www.youtube.com/watch?v=pT_aSqHq3hU

This video produced by CompTIA, presents a short introduction to operating system security and settings.

Activity 5

Show the learners the following short video (4 minutes). https://www.youtube.com/watch?v=lDCgSbrKKGc

This video produced by CompTIA, presents a short introduction to patch management.

2

Copyright © OCR 2015 Copyright © OCR 2015

Activity 6

Show the learners the following short video (4 minutes). https://www.youtube.com/watch?v=wu3CNkaoVmI

This video produced by CompTIA, presents a short introduction to managing password policies.

Activity 7

Ask the learners to consider a well-known organisation, it might be a bank, a supermarket, a car manufacturer, etc. Ask them to recommend software controls that the organisation should use to protect their data. They need to make reference to the data that needs to be protected and details of the software controls that they recommend.

Direct your learners to refer to the following resources: http://www.itgovernance.co.uk/

The above website discusses the importance of patching, vulnerabilities and malware protection.to prevent against an attack to software. http://www.microsoft.com/security/portal/threat/threats.aspx

The above web pages produced by Microsoft discuss the importance of malware protection. http://www.sans.org/critical-security-controls/control/5

The above web site discusses the importance of malware and of securing application software.

Activity 8

Ask your learners to create a user guide for staff at the organisation. They should also document all the sources of information that they use in a detailed report.

We’d like to know your view on the resources we produce. By clicking on ‘

Like

’ or ‘

Dislike

’ you can help us to ensure that our resources work for you. When the email template pops up please add additional comments if you wish and then just c lick ‘Send’. Thank you.

If you do not currently offer this OCR qualification but would like to do so, please complete the Expression of Interest

Form which can be found here: www.ocr.org.uk/expression-of-interest

OCR Resources : the small print

OCR’s resources are provided to support the teaching of OCR specifications, but in no way constitute an endorsed teaching method that is required by the Board, and the decision to use them lies with the individual teacher. Whilst every effort is made to ensure the accuracy of the content, OCR cannot be held responsible for any errors or omissions within these resources.

© OCR 2015 - This resource may be freely copied and distributed, as long as the OCR logo and this message remain intact and OCR is acknowledged as the originator of this work.

OCR acknowledges the use of the following content: Maths and English icons: Air0ne/Shutterstock.com

Please get in touch if you want to discuss the accessibility of resources we offer to support delivery of our qualifications: resources.feedback@ocr.org.uk

Version 1

3

Copyright © OCR 2015 Copyright © OCR 2015

Version 1

Unit 3: Cyber Security

Learner Activity

Software controls used with digital systems

In this Lesson Element you are going to recommend software controls that an organisation should use to secure their data and present your information in the form of a user guide for staff at the organisation.

Activity 1

In this task you are going to focus on the term software controls.

You need to be aware that there are a number of different software methods that can be applied to protect software, example, anti-malware, firewalls and patches.

You also need to be aware that there are procedures that should be followed to prevent software from being compromised, for example, password management procedures.

Make notes and ask your tutor to clarify anything that you are unsure of.

Activity 2

In this task you are going to watch the following short video produced by CompTIA: https://www.youtube.com/watch?v=7Kq1bBxUqLM

This video presents a short introduction to anti-malware software.

Make notes and ask your tutor to clarify anything that you are unsure of.

Activity 3

In this task you are going to watch the following video: https://www.youtube.com/watch?v=XEqnE_sDzSk

This video presents an overview of firewalls and network security.

Make notes and ask your tutor to clarify anything that you are unsure of.

4

Copyright © OCR 2015 Copyright © OCR 2015

Activity 4

In this task you are going to watch the following short video: https://www.youtube.com/watch?v=pT_aSqHq3hU

This video produced by CompTIA, presents a short introduction to operating system security and settings.

Make notes and ask your tutor to clarify anything that you are unsure of.

Activity 5

In this task you are going to watch the following short video: https://www.youtube.com/watch?v=lDCgSbrKKGc

This video produced by CompTIA, presents a short introduction to patch management.

Make notes and ask your tutor to clarify anything that you are unsure of.

Activity 6

In this task you are going to watch the following short video: https://www.youtube.com/watch?v=wu3CNkaoVmI

This video produced by CompTIA, presents a short introduction to managing password policies.

Make notes and ask your tutor to clarify anything that you are unsure of.

Version 1

5

Copyright © OCR 2015 Copyright © OCR 2015

Activity 7

In this task, you are asked to consider a well-known organisation, it might be a bank, a supermarket, a car manufacturer, etc.

You are asked to recommend software controls that the organisation should use to protect their data.

You need to make reference to the data that needs to be protected. http://www.itgovernance.co.uk/

The above website discusses the importance of patching, vulnerabilities and malware protection.to prevent against an attack to software. http://www.microsoft.com/security/portal/threat/threats.aspx

The above web pages produced by Microsoft discuss the importance of malware protection. http://www.sans.org/critical-security-controls/control/5

The above web site discusses the importance of malware and of securing application software.

Activity 8

Present your work in the form of a user guide for staff at the organisation and ensure that you document all of your sources of information in a detailed bibliography.

Version 1

6

Copyright © OCR 2015 Copyright © OCR 2015

Download