Unit 11 Cyber Security and Incident Management 
BTEC Information Technology
A person hacking into a computer
Learning Aim A
Cyber Security Threats
Decorative line separator image
How do we protect systems from internal threats?
Big question mark graphic
Decorative line separator image
1 Video Explainer
Introduction to Topic: What are internal security threats to systems?
Resource 1: Internal Threats Video Produced by NotebookLM (Length 5:12)
2 Key Knowledge Points
Understanding Internal Cyber Security Threats
Internal Threats Key Points Infographic
Resource 2: Internal Threats Infographic Produced by NotebookLM
Decorative horizontal separator line
3 Knowledge Questions
Task: Complete Topic 1 in Workbook 1
The answers can be found in the slide deck below:
Resource 3: Internal Threats Slide Deck Produced by Gamma
Decorative horizontal separator line
Back to Top