{"id":806,"date":"2024-12-05T13:00:31","date_gmt":"2024-12-05T13:00:31","guid":{"rendered":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/?post_type=product&#038;p=806"},"modified":"2025-02-19T14:39:06","modified_gmt":"2025-02-19T14:39:06","slug":"aqa-gcse-8525-slr-04-cyber-security","status":"publish","type":"product","link":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/product\/aqa-gcse-8525-slr-04-cyber-security\/","title":{"rendered":"AQA GCSE (8525) SLR 04 &#8211; Cyber security"},"content":{"rendered":"<p>It includes:<\/p>\n<ul>\n<li><del><\/del>Student Learning Record Workbook (for use by students)<\/li>\n<li>Student Learning Record Answers (for use by teachers)<\/li>\n<li>End of Topic test and answers<\/li>\n<li>Lesson PowerPoint\u2019s for every lesson<\/li>\n<li>Any associated answers or references sheets for class activities<\/li>\n<\/ul>\n<p>This topic covers:<\/p>\n<p>3.6.1 Fundamentals of cyber security<\/p>\n<ul>\n<li>Be able to define the term cyber security and be able to describe the main purposes of cyber security.<\/li>\n<\/ul>\n<p>3.6.2 Cyber security threats<\/p>\n<ul>\n<li>Understand and be able to explain the following cyber security threats:<br \/>\nsocial engineering techniques<br \/>\nmalicious code (malware)<br \/>\npharming<br \/>\nweak and default passwords<br \/>\nmisconfigured access rights<br \/>\nremovable media<br \/>\nunpatched and\/or outdated software<\/li>\n<li>Explain what penetration testing is and what it is used for.<\/li>\n<\/ul>\n<p>3.6.2.1 Social engineering<\/p>\n<ul>\n<li>Define the term social engineering.<\/li>\n<li>Describe what social engineering is and how it can be protected against.<\/li>\n<li>Explain the following forms of social engineering:<br \/>\nblagging (pretexting)<br \/>\nphishing<br \/>\nshouldering (or shoulder surfing)<\/li>\n<\/ul>\n<p>3.6.2.2 Malicious code (malware)<\/p>\n<ul>\n<li>Define the term malware.<\/li>\n<li>Describe what malware is and how it can be protected against.<\/li>\n<li>Describe the following forms of malware:<br \/>\ncomputer virus<br \/>\ntrojan<br \/>\nspyware<\/li>\n<\/ul>\n<p>3.6.3 Methods to detect and prevent cyber security threats<\/p>\n<ul>\n<li>Understand and be able to explain the following security measures:<br \/>\nbiometric measures (particularly for mobile devices)<br \/>\npassword systems<br \/>\nCAPTCHA (or similar)<br \/>\nusing email confirmations to confirm a user\u2019s identity<br \/>\nautomatic software updates<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This download provides you with a zip file which contains all the resources you will need to deliver this topic.<\/p>\n","protected":false},"featured_media":3275,"template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"product_brand":[],"product_cat":[59,22],"product_tag":[],"class_list":{"0":"post-806","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-aqa-gcse-8525-paper-2","7":"product_cat-resources","9":"first","10":"instock","11":"downloadable","12":"virtual","13":"taxable","14":"product-type-simple"},"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/product\/806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/media\/3275"}],"wp:attachment":[{"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/media?parent=806"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/product_brand?post=806"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/product_cat?post=806"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pennstudiostaging.co.uk\/craig-n-dave\/wp-json\/wp\/v2\/product_tag?post=806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}