Lesson Element Unit 3: Cyber Security Instructions and answers for tutors

advertisement
Lesson Element
Unit 3: Cyber Security
Types of cyber security incidents
Instructions and answers for tutors
These instructions cover the learner activity section which can be found on page 4. This
Lesson Element supports Cambridge Technicals in IT Level 3.
When distributing the activity section to the learners either as a printed copy or as a
Word file you will need to remove the tutor instructions section.
The activity
In this lesson element the learners are tasked with researching types of cyber security
incidents. They are to present examples of cyber security incidents, in the form of a
presentation with speaker’s notes and a detailed bibliography.
Suggested timings

Activity 1: 10 minutes

Activity 2: 10 minutes

Activity 3: 10 minutes

Activity 4: 30 minutes

Activity 5: 30 minutes
ABC – This activity offers an
opportunity for English skills
development.
WORK – This activity offers
an opportunity for work
experience.
Activity 1
Begin by introducing your learners to the term cyber security. A resource that you could
make reference to for this definition is found on the following web page:
http://www.itu.int/en/ITU-T/studygroups/2013-2016/17/Pages/cybersecurity.aspx
It presents a broad definition of cyber security that also makes reference to confidentiality,
integrity and availability.
Activity 2
Show the learners the following short video (3 minutes) produced by Cisco:
https://www.youtube.com/watch?v=sdpxddDzXfE
This video presents a short introduction to cyber security
Activity 3
Show your learners the following short video (8 minutes) produced by VM News:
https://www.youtube.com/watch?v=0p3787JiFgQ
This video presents ten facts on cyber security.
Activity 4
Ask the learners to research the following types of cyber security incidents:
Hacking.
Disclosure of government information.
Impairing the operation of a digital system.
Denial of service.
Malware.
Identity theft.
Ask them to provide details of at least one example of each type of incident that they
research.
Version 1
2
Copyright © OCR 2015
Direct your learners to refer to the following resources:
All your devices can be hacked, an article that provides an overview of the problems of cyber
crime.
http://www.ted.com/talks/avi_rubin_all_your_devices_can_be_hacked
NATO and cyber security, information by NATO on the cyber security issues that it faces.
http://www.nato.int/cps/en/natolive/topics_78170.htm
BBC News: Cyber Security
http://www.bbc.co.uk/news/technology-28549494
Computer Weekly
http://www.computerweekly.com
Activity 5
Ask your learners to create a presentation, with speaker’s notes, of their findings. Ask them
to document all the sources of information that they use in a detailed bibliography.
We’d like to know your view on the resources we produce. By clicking on ‘Like’ or ‘Dislike’ you can help us to ensure that
our resources work for you. When the email template pops up please add additional comments if you wish and then just
click ‘Send’. Thank you.
If you do not currently offer this OCR qualification but would like to do so, please complete the Expression of Interest
Form which can be found here: www.ocr.org.uk/expression-of-interest
OCR Resources: the small print
OCR’s resources are provided to support the teaching of OCR specifications, but in no way constitute an endorsed teaching method that is required by the Board, and the decision to
use them lies with the individual teacher. Whilst every effort is made to ensure the accuracy of the content, OCR cannot be held responsible for any errors or omissions within these
resources.
© OCR 2015 - This resource may be freely copied and distributed, as long as the OCR logo and this message remain intact and OCR is acknowledged as the originator of this work.
OCR acknowledges the use of the following content: Maths and English icons: Air0ne/Shutterstock.com
Please get in touch if you want to discuss the accessibility of resources we offer to support delivery of our qualifications: resources.feedback@ocr.org.uk
Version 1
3
Copyright © OCR 2015
Unit 3: Cyber Security
Learner Activity
Types of cyber security incidents
In this Lesson Element you are tasked with researching types of cyber security incidents.
You are to present examples of cyber security incidents, in the form of a presentation with
speaker’s notes and a detailed bibliography.
Activity 1
In this task you are going to focus on the term cyber security.
The following web page presents a broad definition of the term:
http://www.itu.int/en/ITU-T/studygroups/2013-2016/17/Pages/cybersecurity.aspx
Make notes and ask your tutor to clarify anything that you are unsure of.
Activity 2
In this task you are going to watch the following short video. It is a short introduction to
cyber security and is produced by Cisco:
https://www.youtube.com/watch?v=sdpxddDzXfE
Make notes and ask your tutor to clarify anything that you are unsure of.
Activity 3
In this task you are going to watch the following short video. It is presents ten facts on cyber
security:
https://www.youtube.com/watch?v=0p3787JiFgQ
Make notes and ask your tutor to clarify anything that you are unsure of.
Version 1
4
Copyright © OCR 2015
Activity 4
In this task you are asked to research the following types of cyber security incidents:
Hacking.
Disclosure of government information.
Impairing the operation of a digital system.
Denial of service.
Malware.
Identity theft.
Provide details of at least one example of each type of incident that you research.
The following will help you with your research:
All your devices can be hacked, an article that provides an overview of the problems of cyber
crime.
http://www.ted.com/talks/avi_rubin_all_your_devices_can_be_hacked
NATO and cyber security, information by NATO on the cyber security issues that it faces.
http://www.nato.int/cps/en/natolive/topics_78170.htm
and you can also read other news web pages, for example:
BBC News: Cyber Security
http://www.bbc.co.uk/news/technology-28549494
Computer Weekly
http://www.computerweekly.com
Activity 5
Create a presentation, with speaker’s notes, of your findings and remember to document all
sources of information that you use, in a detailed bibliography.
Version 1
5
Copyright © OCR 2015
Related documents
Download