Step-by-Step Lesson

Learn: Anticipating Misuse: Thinking Like a User (and an Attacker)

OCR GCSE J277 Computer Science specification

Ready to start this lesson?

Sign in to track your progress. 11 steps including 5 interactive questions.

Sign In to Start Learning
11 Steps5 Questions

Students also studied

Browse all

Steps in this lesson (11)

1
article

Match the items on the left with their correct pairs on the right

2
article

Match the items on the left with their correct pairs on the right

3
Multiple ChoiceInteractive

Why is anticipating misuse important in designing computer systems?

Start the lesson to answer this multiple choice question

4
article

Match the items on the left with their correct pairs on the right

5
Fill in the BlankInteractive

A system designed with {{blank0}} in mind helps users avoid errors and respond to {{blank1}} situations.

Start the lesson to answer this fill in the blank question

6
article

Match the items on the left with their correct pairs on the right

7
Multiple ChoiceInteractive

What is phishing?

Start the lesson to answer this multiple choice question

8
article

Match the items on the left with their correct pairs on the right

9
MatchingInteractive

Match the items on the left with their correct pairs on the right

Start the lesson to answer this matching question

10
article

Match the items on the left with their correct pairs on the right

11
Multi-SelectInteractive

Which of the following are examples of anticipating misuse? (Select all that apply)

Start the lesson to answer this multi-select question

Want to Learn More?

Get personalised lessons, quizzes, and instant feedback from your AI tutor.

Explore More Topics