Skip to content
Computer Science · Grade 9 · Networks and the Global Web · Term 2

Common Cyber Threats

Students will identify and describe various cyber threats such as malware, phishing, and denial-of-service attacks.

Ontario Curriculum ExpectationsCS.HS.CY.3CS.HS.S.10

About This Topic

Common cyber threats introduce Grade 9 students to key risks in networks and the global web, including malware, phishing, and denial-of-service attacks. Students compare malware types: viruses that infect files and spread when executed, worms that replicate independently across networks, and ransomware that locks data until payment. They examine phishing for traits like spoofed sender addresses, urgent demands, or malicious links, and predict attack impacts such as data loss, financial harm, or service disruptions for individuals and organizations.

This topic supports Ontario Curriculum standards CS.HS.CY.3 and CS.HS.S.10 by cultivating cybersecurity awareness and analytical skills. Students connect threats to everyday digital interactions, like social media or online banking, which sharpens their ability to evaluate online safety and ethical technology use.

Active learning excels with this content because threats feel distant until students engage directly. Simulations of phishing scenarios or collaborative threat hunts turn passive knowledge into practical defenses, boosting confidence and long-term retention through peer discussion and hands-on analysis.

Key Questions

  1. Compare and contrast different types of malware (e.g., viruses, worms, ransomware).
  2. Analyze the characteristics of a phishing attempt to identify potential scams.
  3. Predict the potential impact of a successful cyberattack on an individual or organization.

Learning Objectives

  • Compare and contrast the mechanisms of viruses, worms, and ransomware.
  • Analyze the common elements and deceptive tactics used in phishing attempts.
  • Predict the potential consequences of a successful denial-of-service attack on a specific online service.
  • Evaluate the ethical implications of creating or distributing malware.
  • Identify preventative measures individuals and organizations can take against common cyber threats.

Before You Start

Introduction to Computer Networks

Why: Students need a basic understanding of how computers connect and communicate to grasp how cyber threats exploit these connections.

Digital Citizenship and Online Safety

Why: Prior exposure to general online safety principles provides a foundation for understanding specific cyber threats and preventative measures.

Key Vocabulary

MalwareShort for malicious software, this is any software intentionally designed to cause damage to a computer, server, client, or computer network.
PhishingA cybercrime where attackers attempt to trick victims into revealing sensitive information, such as usernames, passwords, and credit card details, often through deceptive emails or websites.
RansomwareA type of malware that encrypts a victim's files, making them inaccessible until a ransom is paid to the attacker for the decryption key.
Denial-of-Service (DoS) AttackAn attack designed to overwhelm a system, server, or network with traffic, making it unavailable to its intended users.
VirusA type of malware that attaches itself to legitimate files or programs and replicates when those files are executed, spreading to other systems.
WormA standalone type of malware that replicates itself to spread to other computers, often exploiting network vulnerabilities without requiring user interaction.

Watch Out for These Misconceptions

Common MisconceptionAll malware acts the same way and spreads only through downloads.

What to Teach Instead

Viruses need host files to spread, unlike self-replicating worms; ransomware specifically encrypts files. Sorting activities and matching games help students categorize differences through tactile comparison, clarifying propagation methods via group debates.

Common MisconceptionPhishing only occurs through email and is easy to spot.

What to Teach Instead

Phishing uses texts, calls, or sites too, often mimicking trusted sources subtly. Analyzing varied samples in rotations builds detection skills, as peers challenge assumptions during discussions.

Common MisconceptionCyberattacks only target large companies, not everyday users.

What to Teach Instead

Individuals face ransomware or phishing losses routinely. Role-plays simulating personal impacts reveal scale, with shared stories reinforcing vulnerability through empathetic group reflection.

Active Learning Ideas

See all activities

Real-World Connections

  • Cybersecurity analysts at financial institutions like RBC or TD Bank investigate phishing attempts to protect customer accounts from fraud and identity theft.
  • IT departments in hospitals use intrusion detection systems to defend against ransomware attacks that could compromise patient records and disrupt critical healthcare services.
  • Network engineers for internet service providers, such as Bell or Rogers, monitor for and mitigate denial-of-service attacks that could disable internet access for thousands of customers.

Assessment Ideas

Quick Check

Present students with three short scenarios. For each, ask them to identify the primary cyber threat described (malware, phishing, DoS) and briefly explain their reasoning. For example: 'An email arrives asking for your bank login to verify your account; what is this?'

Exit Ticket

Provide students with a template asking them to name one type of malware and describe how it spreads. Then, ask them to list two specific actions they can take to protect themselves from phishing scams.

Discussion Prompt

Pose the question: 'Imagine a popular online game server is taken offline by a DoS attack. What are three potential impacts on the players and the game company?' Facilitate a class discussion to explore consequences like lost revenue, player frustration, and damage to reputation.

Frequently Asked Questions

How do I teach students to compare types of malware?
Start with visual charts distinguishing viruses, worms, and ransomware by spread method, payload, and examples. Use matching games where students pair definitions to real cases like WannaCry ransomware. Follow with discussions on prevention, such as regular scans, to connect theory to habits. This builds clear mental models over 30-40 minutes.
What are key signs of a phishing attempt?
Look for urgent language, unexpected attachments, mismatched URLs, or requests for personal data. Train students by dissecting samples: hover over links to check destinations, verify sender domains. Practice with mixed genuine/scam emails helps spot subtleties, reducing click risks in daily use.
How can active learning help teach common cyber threats?
Active methods like phishing simulations and threat stations make abstract risks tangible. Students crafting scams or role-playing impacts experience decision-making under pressure, improving recall by 30-50% per studies. Peer reviews during rotations foster critical feedback, turning lessons into memorable defenses applicable beyond class.
What impacts do denial-of-service attacks have?
DoS floods servers with traffic, causing outages that halt websites, banking, or school systems. Individuals lose access to services; organizations face revenue drops or reputational harm. Simulations with traffic jam analogies clarify overload mechanics, prompting talks on mitigations like firewalls or CDNs.