Teach Computing

Revision notes, activities, lesson plans, teaching ideas, and other resources for GCSE, A-Level, and IB Computer Science teachers and students.

What's New

Examples of Local Cryptocurrencies

Digital Money for Local Communities covers three examples of country-wide c...

Hash function A hash function takes arbitrary sized input data (e.g. a fil...

Cryptocurrencies vs regular currencies

What is Bitcoin and How Does it Work? is a high level overview of the Bitco...

Examples of Cryptocurrencies

Bitcoin is by far the most well known cryptocurrency. The Bitcoin website w...

Practice paper 3 exam questions

One of the drawbacks of the yearly case study is that there are no past p...

Emergency Management System Explainer Video

This short video gives an overview of some EMIS features. It includes many ...

Geographic Information Systems (GIS)

For some functionality, an EMIS may also be connected to a GIS (Geographic ...

Programming languages - from Scratch to machine code

The CS Field Guide has a very comprehensive guide to different types of pro...

Assembly language simulators

There are several assembly language simulators available for use online. Si...

Resources discount offer

5.2 Network Security

Lesson resources

Networks Banned Words game
Networks revision game
Recommended GCSE Computer Science textbooks
Edexcel Computer Science textbooks
Communications & the Internet keyword bingo game
Communications & the Internet keyword bingo game

5.2.1 Validation and Authentication techniques

5.2.2 Cloud storage security

5.2.3 Types of Cyberattack

Types of malware

Types of Malware

This video explains the various types of malware including viruses and trojans, as well as explaining related terminology such as vector and payload.

Updated: 2018-12-08
Network security

Video: Network Security #1

This video gives an overview of the threats to networked computer systems, including a huge range of vectors from software exploits and code injections to malware to social engineering and misconfigured software.

Updated: 2018-12-08

5.2.4 Identifying Vulnerabilities

Network security

Video: Network Security #2

The second video in this series covers Identifying Vulnerabilities & Security Measures. This covers the techniques used to identify weaknesses in computer security before potential malefactors do: penetration testing and ethical hacking.

Updated: 2018-12-08

5.2.5 Protecting systems from cyberattack

Malware protection

Protecting against Malware

Following on from the Types of Malware video, this video explains techniques for preventing and removing malware - both technological and human based solutions.

Updated: 2018-12-08