icon-background-square
New
New
Year 9

Hacking and brute force attacks

I can describe what illegal attacks on computer systems are.

icon-background-square
New
New
Year 9

Hacking and brute force attacks

I can describe what illegal attacks on computer systems are.

warning

These resources will be removed by end of Summer Term 2025.

Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.

Lesson details

Key learning points

  1. Hacking, in the context of cybersecurity, is gaining unauthorised access to, or control of, a computer system.
  2. The Computer Misuse Act 1990 defines what is considered as unlawful access to computer systems.
  3. DDOS attacks can be used to disrupt online services.
  4. A brute force attack is a trial and error process to gain access to protected resources.

Keywords

  • Hacking - accessing a computer system without permission

  • DDoS - Distributed Denial of Service, an attack used to disrupt communication

  • Brute force attack - accessing a protected resource by repeatedly attempting to guess the key to how it is protected

Common misconception

Hacking a computer system of someone you know as a joke is considered legal.

Even if there is no intention to commit a crime by accessing the computer system of someone you know, the fact that the access is unauthorised is considered a crime.


To help you plan your year 9 computing lesson on: Hacking and brute force attacks, download all teaching resources for free and adapt to suit your pupils' needs...

Crimes performed electronically are often perceived as less harmful than those that happen in a physcial location. Set up a debate in your class to explore this where one side has to argue that it is as harmful and the other that it is not. Draw out that both types of crimes have victims.
speech-bubble
Teacher tip
equipment-required

Equipment

copyright

Licence

This content is © Oak National Academy Limited (2025), licensed on Open Government Licence version 3.0 except where otherwise stated. See Oak's terms & conditions (Collection 2).

Lesson video

Loading...

6 Questions

Q1.
What is the primary purpose of the Data Protection Act 2018?
to regulate traffic laws
to protect wildlife
to improve public transport
Correct answer: to govern personal data handling
Q2.
What is social engineering?
Correct answer: a method to trick people into revealing private data
a type of software
a cybersecurity tool
a form of encryption
Q3.
What is a name generator attack?
a method of encrypting data
Correct answer: a method of collecting personal data through questions
a way to secure data
a type of data backup
Q4.
What is the term for a social engineering technique that involves inventing a scenario to convince someone to hand over data or money?
Correct Answer: blagging
Q5.
What is the term for the act of observing someone's private information, such as a PIN or password, by looking over their shoulder?
Correct Answer: shouldering
Q6.
Why is electronic data vulnerable?
It is always encrypted.
It is stored physically.
It can be easily duplicated.
Correct answer: It can be accessed remotely.

6 Questions

Q1.
What is illegal hacking in the context of cybersecurity?
accessing a computer system with permission
Correct answer: gaining unauthorised access to a computer system
installing antivirus software
creating secure passwords
Q2.
Match the terms with their definitions:
Correct Answer:ethical hacking,legally testing the security of a system to protect it from attacks
tick

legally testing the security of a system to protect it from attacks

Correct Answer:hacktivist,a person that uses hacking to promote a political or social agenda
tick

a person that uses hacking to promote a political or social agenda

Correct Answer:unethical hacking,accessing systems or data without permission for malicious purposes
tick

accessing systems or data without permission for malicious purposes

Correct Answer:data theft,the unauthorised copying, transfer or retrieval of data from a system
tick

the unauthorised copying, transfer or retrieval of data from a system

Q3.
What does a DDoS attack aim to do?
improve website performance
protect user data
Correct answer: disrupt online services
enhance cybersecurity
Q4.
What is the primary difference between a DoS attack and a DDoS attack?
DoS attacks target multiple systems, while DDoS attacks target a single system.
DoS attacks are legal, while DDoS attacks are illegal.
Correct answer: DoS are from a single source, while DDoS are from multiple sources.
DoS attacks cause permanent damage, while DDoS attacks are temporary.
Q5.
Order the steps in a typical brute force attack.
1 - identify the target
2 - attempt multiple password guesses
3 - monitor for successful login attempts
4 - gain unauthorised access
Q6.
True or false? Unauthorised access to a computer system is considered a crime under the Computer Misuse Act 1990, even if done as a joke.
Correct answer: True
False