Skip to content
Computer Science · Grade 11 · Networks and Digital Security · Term 4

Cybersecurity Threats: Malware and Social Engineering

Identify common attack vectors like phishing, SQL injection, and man-in-the-middle attacks.

Ontario Curriculum ExpectationsCS.HS.S.2CS.HS.S.3

About This Topic

Cybersecurity threats such as malware and social engineering form the core of digital defense in Grade 11 Computer Science. Students identify key attack vectors, including phishing that manipulates users into sharing sensitive data, SQL injection which exploits unvalidated database inputs, and man-in-the-middle attacks that eavesdrop on unsecured communications. These align with Ontario curriculum standards CS.HS.S.2 and CS.HS.S.3, addressing how developers create systems resilient to human error while balancing security with user convenience.

Positioned in the Networks and Digital Security unit, this topic connects technical coding practices with ethical considerations like defining ethical hacking in corporate contexts. Students analyze real-world incidents to understand layered defenses: encryption for interception risks, input sanitization for injections, and awareness training for social tactics.

Active learning excels with this content through interactive simulations and role-plays. When students design mock phishing campaigns or patch vulnerable code in collaborative challenges, threats shift from abstract warnings to tangible experiences. This approach strengthens problem-solving, ethical reasoning, and retention far beyond passive instruction.

Key Questions

  1. How can developers build systems that are resilient to human error?
  2. What is the balance between system security and user convenience?
  3. How do we define ethical hacking in the context of corporate security?

Learning Objectives

  • Analyze the common techniques used in phishing attacks to manipulate user behavior and extract sensitive information.
  • Evaluate the effectiveness of input sanitization and validation in preventing SQL injection vulnerabilities.
  • Compare and contrast the security risks and user convenience trade-offs associated with man-in-the-middle attacks.
  • Design a basic defense strategy to mitigate the impact of malware on a small business network.
  • Explain the ethical considerations and legal boundaries of ethical hacking within a corporate cybersecurity framework.

Before You Start

Introduction to Networks and Internet Protocols

Why: Understanding basic network communication, IP addresses, and protocols is essential for grasping how man-in-the-middle attacks function.

Basic Web Development Concepts (HTML, HTTP)

Why: Knowledge of how web pages are structured and how requests/responses work is necessary to understand vulnerabilities like SQL injection and phishing vectors.

Data Types and Variables

Why: Understanding how data is stored and manipulated is foundational for comprehending input validation and potential injection attacks.

Key Vocabulary

PhishingA cyberattack where attackers impersonate legitimate entities via email, text, or other communication channels to trick individuals into revealing sensitive information or installing malware.
SQL InjectionA code injection technique used to attack data-driven applications, where malicious SQL statements are inserted into an entry field for execution.
Man-in-the-Middle (MitM) AttackAn attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
MalwareShort for malicious software, this includes viruses, worms, trojans, ransomware, and spyware, designed to damage, disrupt, or gain unauthorized access to computer systems.
Input SanitizationThe process of cleaning or filtering user-supplied data to prevent malicious code or commands from being executed by an application.

Watch Out for These Misconceptions

Common MisconceptionAntivirus software detects all malware automatically.

What to Teach Instead

Many advanced malware uses evasion techniques like polymorphism, and social engineering bypasses tools entirely. Role-play simulations let students experience undetected threats firsthand, revealing the need for behavioral training alongside tech solutions.

Common MisconceptionSQL injection only targets large websites with complex databases.

What to Teach Instead

Any app accepting user input without validation risks injection, from school projects to enterprise systems. Hands-on coding labs demonstrate exploits on simple forms, helping students apply defenses universally.

Common MisconceptionSocial engineering relies solely on technical tricks, not human psychology.

What to Teach Instead

Phishing succeeds through trust and urgency cues. Mock email exchanges in groups expose psychological levers, building empathy for user vulnerabilities and proactive design habits.

Active Learning Ideas

See all activities

Real-World Connections

  • Cybersecurity analysts at major banks like RBC or TD monitor network traffic for anomalies indicative of phishing or man-in-the-middle attacks, protecting customer accounts.
  • Software developers at companies like Shopify implement rigorous input validation and sanitization techniques to prevent SQL injection vulnerabilities, safeguarding user data and e-commerce transactions.
  • Ethical hackers, often employed by cybersecurity firms like Mandiant, conduct penetration tests on corporate networks to identify weaknesses before malicious actors can exploit them, ensuring system integrity.

Assessment Ideas

Quick Check

Present students with three short scenarios. For each, ask them to identify the primary cybersecurity threat (phishing, SQL injection, MitM) and briefly explain why. Example: 'An email asks you to click a link to verify your bank account details, or your account will be locked.' Ask: 'What threat is this, and what makes it that threat?'

Discussion Prompt

Pose the question: 'What is the most challenging aspect of balancing user convenience with robust cybersecurity measures?' Facilitate a class discussion where students share examples of security features that hinder usability and vice versa, relating it to the threats discussed.

Exit Ticket

On an index card, have students define one of the key vocabulary terms in their own words and provide one real-world example of how that threat could impact an individual or organization. Collect and review for understanding.

Frequently Asked Questions

How can active learning help students understand cybersecurity threats?
Active strategies like phishing role-plays and SQL injection coding challenges make abstract risks concrete. Students actively craft attacks or defenses, experiencing human error impacts and technical fixes. This builds deeper retention, ethical insight, and practical skills compared to lectures, as collaborative debriefs connect personal actions to real-world resilience.
What are common examples of social engineering in cybersecurity?
Phishing emails mimic trusted sources to extract credentials, pretexting involves fabricated scenarios for info, and baiting uses enticing USB drives. Students explore these via simulations to recognize urgency tactics and verify sources, fostering habits like two-factor authentication and cautious clicks.
How do you safely demonstrate SQL injection in a Grade 11 class?
Use isolated sandboxes or online tools like SQLFiddle with pre-vulnerable code. Guide students to inject payloads, observe data leaks, then apply fixes like parameterized queries. Emphasize ethical bounds and pair with discussions on input validation best practices.
What defenses counter man-in-the-middle attacks?
Implement HTTPS with certificate validation, VPNs for encrypted tunnels, and HSTS policies. Class activities dissecting Wi-Fi logs reveal interception points, teaching students to prioritize end-to-end encryption and avoid public networks for sensitive tasks.