Professional Documents
Culture Documents
Year 9 - Cybersecurity Lesson 6 - Under Attack Lesson Plan
Year 9 - Cybersecurity Lesson 6 - Under Attack Lesson Plan
Year 9 - Cybersecurity Lesson 6 - Under Attack Lesson Plan
Learning objectives
● Identify the most effective methods to prevent cyberattacks
Key vocabulary
Blagging, ransomware, DDoS, brute force, virus, malware, hacking, spyware, adware,
firewall, two-factor authentication (2FA), backups, CAPTCHA, Internet Service Provider
(ISP), auto-updates
Preparation
Subject knowledge:
You will need to familiarise yourself with the rules of the game for Activity 1 and look at
the terminology that is used. You should be prepared to debate with confidence the
different methods of protecting against the attacks.
This is a topic that encourages learners to reflect on their own knowledge and
experiences as well as ethical viewpoints, so it is helpful to have a good understanding of
the key terms.
You will need to make sure that this website is accessible to your learners:
https://www.cybersecuritychallenge.org.uk/resources/careers
Assessment opportunities
Activity 1 requires learners to apply their knowledge from this unit by identifying the
cybercrime and working out which method of protection would be most effective in
preventing the attacks. You can assess the learners’ understanding through their
answers as well as helping to steer the conversations to lead them to the appropriate
answers.
Outline plan
Please note that the slide deck labels the activities in the top right-hand corner to help
you navigate the lesson.
Select learners to give one answer each and write them on the board until
no one has any more to mention.
Move onto slide 4, where suggested answers have been given (your class
may have a longer list, but this is an example list that includes the key
methods they have learnt about in this unit).
This will focus their minds on what types of attack each method is designed
to prevent. Take some answers from the learners, but there doesn’t need to
be a discussion at this stage, as they will think about this again when
reflecting on what happened during Activity 1.
managers for an online retailer and they have to work in small groups to
think strategically to defend themselves against incoming attacks.
Full instructions on how to set up and play the game can be found here:
Slides have been provided on the slide deck to help walk the learners
through the game.
At the end of the activity, show slide 15 and pose the following two
questions to the groups to prompt reflection:
In the scenarios written for the game, two-factor authentication and anti-
malware were two protection methods that thwarted the most attacks.
Emphasise to the learners that although they were working for an online
retailer, these are two things that they can put in place on their own devices
and accounts. A lot of companies provide the option to set up two-factor
authentication for free (Google, eBay, FaceBook, and Paypal are just some
examples). There are also a lot of free anti-malware software providers.
https://www.cybersecuritychallenge.org.uk/resources/careers
(ncce.io/cybercareers)
There are interviews with women who work in the cybersecurity industry, as
well as videos to watch about career pathways. Provide headphones to
avoid distracting learners who are still working on their assessment.
This resource is available online at ncce.io/cybs-6-p. Resources are updated regularly — please check that
you are using the latest version.
This resource is licensed under the Open Government Licence, version 3. For more information on this
licence, see ncce.io/ogl.