Skip to content
Computing · Year 7 · Impacts and Digital Literacy · Autumn Term

Cybersecurity Threats: Phishing & Malware

Understanding common threats like phishing and malware and how to defend against them.

National Curriculum Attainment TargetsKS3: Computing - Online SafetyKS3: Computing - Cybersecurity

About This Topic

Cybersecurity threats like phishing and malware pose real risks to individuals online. In Year 7, students explore phishing as deceptive emails or messages that trick users into sharing personal data or clicking harmful links. They identify common signs such as urgent language, unexpected attachments, and suspicious sender addresses. Malware includes viruses that replicate and damage files, trojans that disguise as legitimate software, and ransomware that locks devices until payment. Students learn why hackers target individuals: personal data fuels identity theft, and everyday users often lack strong defences compared to corporations.

This topic aligns with KS3 Computing standards on online safety and cybersecurity within the Impacts and Digital Literacy unit. It develops critical thinking by analysing threats and evaluating defences like strong passwords, software updates, and two-factor authentication. Students connect these concepts to daily digital habits, fostering responsible online behaviour.

Active learning suits this topic well. Role-playing phishing scenarios or dissecting mock emails in groups makes abstract threats concrete. Simulations of malware spread encourage collaborative problem-solving, helping students internalise safe practices through trial and reflection.

Key Questions

  1. Explain why hackers target individuals rather than just large corporations.
  2. Analyze the common characteristics of a phishing attempt.
  3. Differentiate between various types of malware and their impact.

Learning Objectives

  • Analyze the common tactics used in phishing attempts to deceive individuals.
  • Differentiate between at least three types of malware (e.g., virus, trojan, ransomware) and explain their distinct impacts.
  • Evaluate personal online behaviours and propose specific strategies to mitigate the risk of phishing and malware infection.
  • Explain why cybercriminals target individuals, citing at least two motivations.

Before You Start

Introduction to the Internet and Online Communication

Why: Students need a basic understanding of how the internet works and common communication methods like email to grasp how threats are delivered.

Digital Citizenship and Online Etiquette

Why: Prior knowledge of responsible online behaviour provides a foundation for understanding the consequences of falling victim to cyber threats.

Key Vocabulary

PhishingA fraudulent attempt, usually made through deceptive emails, messages, or websites, to trick individuals into revealing sensitive information like passwords or credit card details.
MalwareShort for malicious software, this includes viruses, worms, trojans, ransomware, and spyware designed to harm or exploit computer systems or data.
RansomwareA type of malware that encrypts a victim's files, demanding a ransom payment, typically in cryptocurrency, to restore access.
Trojan HorseMalware disguised as legitimate software or a useful file, which, once executed, allows attackers to gain unauthorized access or cause damage.
Social EngineeringThe psychological manipulation of people into performing actions or divulging confidential information, often used as a component of phishing attacks.

Watch Out for These Misconceptions

Common MisconceptionPhishing emails only come from unknown senders.

What to Teach Instead

Phishing often mimics trusted contacts or banks to build false security. Active role-plays where students craft and spot fakes reveal how familiarity lowers guards. Group discussions refine detection skills through shared examples.

Common MisconceptionAntivirus software stops all malware completely.

What to Teach Instead

Antivirus detects known threats but misses new variants; safe habits matter more. Simulations of malware bypassing scans show this gap. Hands-on trials with mock infections build layered defence awareness.

Common MisconceptionHackers target people for fun, not real gain.

What to Teach Instead

Hackers seek data for fraud or sale, targeting individuals as easy marks. Analysing case studies in groups connects motives to impacts. Collaborative threat mapping clarifies economic drivers.

Active Learning Ideas

See all activities

Real-World Connections

  • Cybersecurity analysts at companies like Google investigate millions of reported phishing emails daily, developing filters and security protocols to protect users of services like Gmail.
  • Individuals can become victims of identity theft if their personal data, stolen through phishing, is sold on the dark web to criminals who then open fraudulent accounts or take out loans in their name.
  • The National Health Service (NHS) experienced significant disruption from the WannaCry ransomware attack in 2017, highlighting how malware can impact critical public services and patient care.

Assessment Ideas

Exit Ticket

Provide students with three short scenarios describing online interactions. Ask them to identify which scenario represents a phishing attempt, explain why, and suggest one action they would take to stay safe.

Discussion Prompt

Pose the question: 'Why might a hacker be more interested in stealing your social media password than a large bank's entire customer database?' Facilitate a class discussion, guiding students to consider the value of individual data and the ease of targeting less protected users.

Quick Check

Present students with a mock email that contains common phishing indicators (e.g., urgent tone, generic greeting, suspicious link). Ask them to highlight at least two red flags and explain what makes them suspicious.

Frequently Asked Questions

How can active learning help students understand cybersecurity threats?
Active methods like phishing email dissections and malware simulations engage students directly with threats. In pairs or groups, they spot red flags in real-looking examples, simulate attacks on mock networks, and role-play defences. This builds confidence in recognition and response, turning passive knowledge into practical skills through discussion and reflection. Teachers see immediate gains in critical analysis.
What are the common characteristics of a phishing attempt?
Phishing features urgent demands for action, suspicious links or attachments, generic greetings, poor spelling, and pressure to share info. Students learn to hover over links without clicking and verify senders. Practice with annotated examples reinforces these traits, linking to safe verification steps like contacting sources directly.
Why do hackers target individuals rather than just large corporations?
Individuals hold valuable personal data like bank details with fewer protections. Corporations invest heavily in security, while people often reuse weak passwords. Exploring real cases shows how small gains from many targets yield big profits. This motivates students to prioritise personal cybersecurity.
How can students defend against phishing and malware?
Use strong, unique passwords with managers, enable two-factor authentication, keep software updated, and avoid unsolicited links. Install reputable antivirus and report suspects. Hands-on checklist creation and peer teaching solidify routines, ensuring defences become habits.