Our site uses cookies. Some of the cookies we use are essential for parts of the site to operate and have already been set. You may delete and block all cookies from this site, but parts of the site will not work. To find out more about cookies on this website, see our cookie policy.

ZigZag Education Photocopiable and digital teaching resources
Basket
  • Home
  • About Us
    About ZigZag Education Become an Author Vacancies Affiliates
  • FAQ
    Frequently Asked Questions Delivery Licensing Terms & Conditions Inspection Copies Fast Shop (for accounts departments)
  • Contact
  • Sign In
  • Computer Science and IT
  • Weblinks
  • 12912 - AAQ BTEC National IT Course Companion: Unit 2: Cyber Security & Incident Management

Weblinks and videos for use with 12912 – AAQ BTEC National IT Course Companion: Unit 2: Cyber Security & Incident Management

Teacher's Introduction

  • The National Cyber Security Centre (NCSC)
  • Get Safe Online
  • UK government security policy framework to protect government assets
  • National Institute of Standards and Technology (NIST)
  • US National Vulnerability Database (NVD) managed by NIST
  • FAST – campaigns against software piracy and helps organisations be compliant with licences

Content Area A: Cyber security threats, system vulnerabilities and security protection methods

  • A1: Research Activity: Talk Talk 2015 cyberattack
  • A1: Research Activity: Dixons Carphone data breach 2017
  • A1: Research Activity: EasyJet cyberattack 2020

  • A1.1.4: Research Activity: Personal data breach cases
  • A1.1.4: Research Activity: Tile

  • A1.2.1: Research Activity: AI

  • A1.2.2: Research Activity: 6 Motivations of Cyber Criminals
  • A1.2.2: Research Activity: The Psychology of Cybersecurity
  • A1.2.2: Research Activity: 7 of the Most Famous Hackers in History

  • A1.2.4: Research Activity: Types of social engineering attacks

  • A1.4: Research Activity: National Cyber Security Centre

  • A2.1.3: Case Study: The 10 Worst Zero-Day Attacks Ever

  • A2.1.7: Case Study: Signal

  • A2.3.1: Research Activity: Ensuring wireless network security

  • A2.6.3: Research Activity: Hak5

  • A3.1.1: UK GDPR guidance and resources

  • A3.1.2: Computer Misuse Act 1990

  • A3.3.1: Discussion Point: Case Study

  • A4.1.5: Authentication methods

  • A4.2.2: Research Activity: File Encryption 101: Safeguarding Your Sensitive Data

Content Area B: Use of networking architectures and principles for security

  • B3.2: Research Activity: Network Segmentation

  • B3.4.1: Activity B8: Domain records

Content Area C: Cyber security documentation

  • C1.1.1: Activity C2: The logic behind three random words

  • C1.1.4: Case Study: Data protection officers

© ZigZag Education®, Unit 3, Greenway Business Centre, Doncaster Road, Bristol BS10 5PY | Privacy Policy | Cookie Policy | Accessibility Policy 🤖 | Follow Us Join Us