Firefly needs a modern browser, so you may notice things look broken right now.

To get a better experience, try one of the supported browsers listed here.

  • Explore
    • 1.1 The characteristics of contemporary processors, input, output and storage devices
    • 1.2 Software and software development
    • 1.3 Exchanging Data
      • 1.3.1 Compression, Encryption, Hashing
      • 1.3.2 Databases
      • 1.3.3 Networks
        • 01 Characteristics of networks
        • 02 Internet Structure
        • 03 Network Security
        • 04 Network Hardware
        • 05 Client-Server and peer to peer
        • 06 Section Overview and Learning Record
        • The Deep Dark Web
      • 1.3.4 Web Technologies
    • 1.4 Data types, data structures and algorithms
    • 1.5 Legal, moral, cultural and ethical issues
  • 1.3 Exchanging Data
  • 1.3.3 Networks
  • 03 Network Security

03 Network Security

  • The Deep Dark Web


SQL Injection 

Click here to complete the Cyber Security Challenge! 

Cyber Security Games - https://cybergamesuk.com/cybergames - open in edge

Lesson PowerPoint

  • Network Security.pptx2mb

Firewall Activity

Network Ports

What is a Proxy Server and how does it work

Trojan Virus 

Cascade Virus

Worst Viruses of all time 


Lesson Activities

  • 05. A-Level - Network security Activity 1.pptx
  • 05. A-Level - Network security Activity 2.pptx

Onion Routing and Tor Browsing

Social Engineering

Phishing

Blagging 

  • Last updated by Mrs R Lofthouse
  • Last updated 27/02/2024
  • More page information