Skip to content
Computing · Year 5 · Digital Creativity and Citizenship · Summer Term

Cybersecurity Basics

Learning about common online threats like viruses and phishing, and basic ways to protect against them.

National Curriculum Attainment TargetsKS2: Computing - Online Safety

About This Topic

Cybersecurity Basics equips Year 5 students with practical knowledge of online threats and defences, aligning with KS2 Computing standards for online safety. Students identify viruses, which spread through downloads and corrupt files, and phishing attacks that mimic trusted sources to steal login details. They practise spotting suspicious links or attachments, craft strong passwords using mixed characters, and create personal rules for safe computing, such as logging out of shared devices.

This unit builds digital citizenship within the Digital Creativity and Citizenship progression. It connects to everyday scenarios like school email use or gaming apps, developing critical thinking and responsible habits. Students differentiate weak passwords, like 'password123', from strong ones, like 'Tr3eH0use!22', and explain risks in group discussions.

Active learning excels for this topic because threats feel distant until students simulate them. Role-playing phishing or testing passwords collaboratively makes abstract rules concrete, increases engagement, and ensures students internalise safety through trial and peer feedback.

Key Questions

  1. Explain the dangers of clicking on suspicious links or attachments.
  2. Differentiate between a strong password and a weak password.
  3. Design a set of rules for keeping your computer and personal information safe online.

Learning Objectives

  • Identify common types of online threats, such as viruses and phishing attempts.
  • Compare and contrast strong and weak password characteristics.
  • Explain the risks associated with clicking on suspicious links or opening unknown attachments.
  • Design a personal set of rules for maintaining online safety and protecting personal information.

Before You Start

Basic Computer Operations

Why: Students need to be familiar with how to use a computer, open applications, and navigate basic interfaces before learning about protecting those systems.

Introduction to the Internet and Web Browsing

Why: Understanding how to access websites and use a web browser is fundamental to grasping online safety concepts.

Key Vocabulary

VirusA type of malicious software that can spread from one computer to another, often damaging files or disrupting computer operations.
PhishingA fraudulent attempt to obtain sensitive information like usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
PasswordA secret word or phrase that must be used to gain admission to something, such as a computer system or online account.
Suspicious LinkA web address that may lead to a harmful website or download malware, often disguised to look legitimate.

Watch Out for These Misconceptions

Common MisconceptionAntivirus software stops all online threats.

What to Teach Instead

No single tool blocks everything; human vigilance against phishing is key. Role-play activities let students experience layered defences, clarifying that software supports but does not replace safe habits like checking sender details.

Common MisconceptionStrong passwords just need to be long.

What to Teach Instead

Length alone fails without variety like numbers and symbols. Password challenges in groups reveal why simple long words crack easily, as students test and compare, building accurate criteria through hands-on trials.

Common MisconceptionPhishing only targets adults with bank details.

What to Teach Instead

Children face risks like fake game logins stealing accounts. Simulations make this personal, as peer discussions during role-plays connect threats to students' lives, correcting the idea that they are immune.

Active Learning Ideas

See all activities

Real-World Connections

  • Cybersecurity analysts at companies like Google or Microsoft work to detect and prevent new online threats, protecting millions of users from data theft and system damage.
  • Parents often set up parental controls on devices used by their children, creating rules and monitoring online activity to ensure a safe digital environment.
  • Bank employees use strong authentication methods and security protocols to protect customer accounts from unauthorized access and fraud.

Assessment Ideas

Exit Ticket

Provide students with two sample passwords, one strong and one weak. Ask them to write one sentence explaining why one is stronger than the other and list two characteristics of a strong password.

Discussion Prompt

Present a scenario: 'You receive an email from a company you shop with, asking you to click a link to confirm your account details due to a security issue.' Ask students: 'What are the potential dangers here? What steps should you take before clicking any link?'

Quick Check

Show students several icons or short descriptions of online actions (e.g., downloading a game from an unknown site, opening an email attachment from a stranger, logging into a school account). Ask them to give a thumbs up for safe actions and a thumbs down for risky ones, explaining their reasoning for at least two.

Frequently Asked Questions

What are common online threats for Year 5 students?
Viruses damage devices via unsafe downloads, while phishing uses fake emails or sites to trick sharing of logins or info. Year 5 pupils encounter these in gaming chats or school apps. Teach recognition through red flags like urgent demands or odd sender addresses, paired with rules like verifying before clicking.
How to teach strong vs weak passwords?
Show examples: weak like 'dog123' cracks fast, strong like 'Bl ueSky7!'. Use cracking tools or games to demonstrate time differences. Students create and peer-review passwords, applying criteria of 12+ characters with mixes, ensuring they grasp complexity without memorisation overload.
How can active learning help students understand cybersecurity?
Active methods like role-playing phishing or group password tournaments turn passive rules into memorable experiences. Students simulate threats, debate decisions, and test protections, revealing gaps in understanding. This builds confidence, as peer feedback and hands-on trials make safety skills stick better than lectures alone.
What rules should Year 5 students follow for online safety?
Key rules include never clicking unknown links, using unique strong passwords per site, telling adults about suspicious contacts, and keeping software updated. Design class rules via brainstorming to own them. Regular practice through scenarios reinforces these as lifelong habits tailored to their digital world.