GCSE
Lesson 3 Be suspicious part 2 - Automated cybercrime
This lesson builds on the previous one, which was about non-automated cybercrime, to enable learners to distinguish between non-automated and automated cybercrime. Learners will begin to understand terms and techniques related to automated cybercrime and the vulnerabilities in a network or software that make companies or individuals vulnerable to such attacks.
Learning objectives
- Describe automated forms of cyberattack
- Analyse a real cyberattack and identify the network or software weaknesses that enabled it to happen
Package contents
- Lesson plans
- Learning graphs
- Unit overviews
- Activities
Not registered yet?
Create an account and get access to over 500 hours of free teaching resources.