You are on page 1of 5

Lesson Element

Unit 3: Cyber Security


Types of cyber security incidents

Instructions and answers for tutors

These instructions cover the learner activity section which can be found on page 4. This
Lesson Element supports Cambridge Technicals in IT Level 3.

When distributing the activity section to the learners either as a printed copy or as a
Word file you will need to remove the tutor instructions section.

The activity
In this lesson element the learners are tasked with researching types of cyber security
incidents. They are to present examples of cyber security incidents, in the form of a
presentation with speakers notes and a detailed bibliography.

Suggested timings
Activity 1: 10 minutes
Activity 2: 10 minutes
Activity 3: 10 minutes
Activity 4: 30 minutes
Activity 5: 30 minutes

ABC This activity offers an WORK This activity offers


opportunity for English skills an opportunity for work
development. experience.
Activity 1
Begin by introducing your learners to the term cyber security. A resource that you could
make reference to for this definition is found on the following web page:
http://www.itu.int/en/ITU-T/studygroups/2013-2016/17/Pages/cybersecurity.aspx

It presents a broad definition of cyber security that also makes reference to confidentiality,
integrity and availability.

Activity 2

Show the learners the following short video (3 minutes) produced by Cisco:
https://www.youtube.com/watch?v=sdpxddDzXfE

This video presents a short introduction to cyber security

Activity 3

Show your learners the following short video (8 minutes) produced by VM News:
https://www.youtube.com/watch?v=0p3787JiFgQ

This video presents ten facts on cyber security.

Activity 4

Ask the learners to research the following types of cyber security incidents:

Hacking.

Disclosure of government information.

Impairing the operation of a digital system.

Denial of service.

Malware.

Identity theft.

Ask them to provide details of at least one example of each type of incident that they
research.

Version 1 2 Copyright
Copyright
OCR
OCR 2015
2015
Direct your learners to refer to the following resources:

All your devices can be hacked, an article that provides an overview of the problems of cyber
crime.

http://www.ted.com/talks/avi_rubin_all_your_devices_can_be_hacked

NATO and cyber security, information by NATO on the cyber security issues that it faces.

http://www.nato.int/cps/en/natolive/topics_78170.htm

BBC News: Cyber Security

http://www.bbc.co.uk/news/technology-28549494

Computer Weekly

http://www.computerweekly.com

Activity 5

Ask your learners to create a presentation, with speakers notes, of their findings. Ask them
to document all the sources of information that they use in a detailed bibliography.

Wed like to know your view on the resources we produce. By clicking on Like or Dislike you can help us to ensure that our
resources work for you. When the email template pops up please add additional comments if you wish and then just click
Send. Thank you.
If you do not currently offer this OCR qualification but would like to do so, please complete the Expression of Interest Form
which can be found here: www.ocr.org.uk/expression-of-interest

OCR Resources: the small print

OCRs resources are provided to support the teaching of OCR specifications, but in no way constitute an endorsed teaching method that is required by the Board, and the
decision to use them lies with the individual teacher. Whilst every effort is made to ensure the accuracy of the content, OCR cannot be held responsible for any errors or omissions
within these resources.
OCR 2015 - This resource may be freely copied and distributed, as long as the OCR logo and this message remain intact and OCR is acknowledged as the originator of this work.
OCR acknowledges the use of the following content: Maths and English icons: Air0ne/Shutterstock.com
Please get in touch if you want to discuss the accessibility of resources we offer to support delivery of our qualifications: resources.feedback@ocr.org.uk

Version 1 3 Copyright
Copyright
OCR
OCR 2015
2015
Unit 3: Cyber Security

Learner Activity
Types of cyber security incidents
In this Lesson Element you are tasked with researching types of cyber security incidents.
You are to present examples of cyber security incidents, in the form of a presentation with
speakers notes and a detailed bibliography.

Activity 1

In this task you are going to focus on the term cyber security.

The following web page presents a broad definition of the term:


http://www.itu.int/en/ITU-T/studygroups/2013-2016/17/Pages/cybersecurity.aspx

Make notes and ask your tutor to clarify anything that you are unsure of.

Activity 2

In this task you are going to watch the following short video. It is a short introduction to
cyber security and is produced by Cisco:
https://www.youtube.com/watch?v=sdpxddDzXfE

Make notes and ask your tutor to clarify anything that you are unsure of.

Activity 3

In this task you are going to watch the following short video. It is presents ten facts on cyber
security:
https://www.youtube.com/watch?v=0p3787JiFgQ

Make notes and ask your tutor to clarify anything that you are unsure of.

Version 1 4 Copyright
Copyright OCR 2015
Activity 4

In this task you are asked to research the following types of cyber security incidents:

Hacking.

Disclosure of government information.

Impairing the operation of a digital system.

Denial of service.

Malware.

Identity theft.

Provide details of at least one example of each type of incident that you research.

The following will help you with your research:

All your devices can be hacked, an article that provides an overview of the problems of cyber
crime.

http://www.ted.com/talks/avi_rubin_all_your_devices_can_be_hacked

NATO and cyber security, information by NATO on the cyber security issues that it faces.

http://www.nato.int/cps/en/natolive/topics_78170.htm

and you can also read other news web pages, for example:

BBC News: Cyber Security

http://www.bbc.co.uk/news/technology-28549494

Computer Weekly

http://www.computerweekly.com

Activity 5

Create a presentation, with speakers notes, of your findings and remember to document all
sources of information that you use, in a detailed bibliography.

You might also like