Cyber Security: A Vital Overview

Cyber Security: A Vital Overview
Slide Note
Embed
Share

The transition task focuses on Cyber Security, a critical aspect in today's digital age. Students will delve into various topics like types of cyber security incidents, threats, impact analysis, and real-life examples. The task entails creating a documentary video, presentation, or magazine article to showcase their understanding of Cyber Security policies, protection of information, and the motivations behind cyber attacks. It also emphasizes the importance of research, content quality, and overall effort in presenting the topic effectively.

  • Cyber Security
  • Transition Task
  • Information Protection
  • Cyber Attacks
  • Digital Security

Uploaded on Mar 08, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. OCR Cambridge Technical L3 IT Transition Task Never before in history has innovation offered promise of so much to so many in so short a time - Bill Gates

  2. Welcome to Post 16 Welcome to Post 16 ICT at Hucknall Hucknall Sixth Form Centre. Sixth Form Centre. This This is your opportunity to is your opportunity to learn the hottest topic in the learn the hottest topic in the industry industry Cyber Security. Cyber Security. Excellent preparation for the Excellent preparation for the world of work and further world of work and further learning on how IT and learning on how IT and Computing making an impact Computing making an impact to society and the world. to society and the world. ICT at A good choice has been made A good choice has been made! !

  3. Transition Task There are many topics to choose for your Transition task but we have chosen a topic which I hope can hold your interest in the summer. It will be on CYBER SECURITY. This chosen topic is something you may not have covered at Key Stage 3 or 4. You are to prepare a 30 minute documentary video (eg. Panaroma on tv) or a presentation (with explanation in notes pages) or a magazine article (eg. Times Magazine) on Cyber Security which will include the following content : What is Cyber Security? Why is Cyber Security policies essential in organizations? The importance of protection information for confidentiality, integrity, availability Discuss in details the Types of cyber security incidents : o Unauthorized access (eg. Hacking, escalation of privileges) o Information disclosure (eg. Personal information, government information) o Modification of data o Inaccessible data (eg. Account lockout, denial of service) o Destruction (eg. Malware, deliberate erasure) o Theft (eg. Identify, finance, military service)

  4. Discuss in details the Threats to cyber security : o Vulnerabilities (system attacks, physical threats, environmental eg. Floods, natural disasters) o Accidental o Intentional o Organized crime o State sponsored (Eg. Spying, espionage) The characteristics and motivations of each of these types of attackers : o Hacktivist o Cyber criminal o Insider (eg. Disgruntled employee) o Script kiddie (eg. Bored youth) o Vulnerability broker (eg. Hacking as a business) o Scammers o Phishers o Cyber-terrorists Impacts of cyber security incidents : o Discuss five real-life examples of cyber security incidents which occur in the last few years and its impact to the affected organizations. Any other information you think is relevant and interesting on Cyber Security Finally, please include a list of all the sources you ve used, and a brief comment evaluating which were most/least useful/reliable and why.

  5. Assessment Criteria Your work must be detailed suitable for post 16 students. Your transition work will be assessed in terms of research/ content/presentation/ effort. Your work must demonstrate your passion to the topic and the commitment to the subject. Advice for the task Useful websites : http://www.itgovernance.co.uk/what-is-cybersecurity.aspx https://www.gov.uk/government/policies/cyber-security http://www.bbc.co.uk/news/technology-28549494 (or google BBC cyber security) http://www.computerweekly.com/news/4500260419/Top-10-cyber-crime-stories- of-2015

  6. Extension task Play this Cyber Security game (you will need to create a login to save your game) http://www.pbs.org/wgbh/nova/labs/lab/cyber/ To get this link, google cyber security game Also check out at the same place this document : Planning and preparing to write assignments by University of Nottingham. Source : http://www.nottingham.ac.uk/studentservices/documents/planning-and- preparing-to-write-assignments.pdf Please ensure you have also completed the bridging tasks set by ICT. Please contact Mr. Parker jparker@nationalce-ac.org.uk if you have any further questions.

More Related Content