Hacking and brute force attacks
I can describe what illegal attacks on computer systems are.
Hacking and brute force attacks
I can describe what illegal attacks on computer systems are.
These resources will be removed by end of Summer Term 2025.
Lesson details
Key learning points
- Hacking, in the context of cybersecurity, is gaining unauthorised access to, or control of, a computer system.
- The Computer Misuse Act 1990 defines what is considered as unlawful access to computer systems.
- DDOS attacks can be used to disrupt online services.
- A brute force attack is a trial and error process to gain access to protected resources.
Keywords
Hacking - accessing a computer system without permission
DDoS - Distributed Denial of Service, an attack used to disrupt communication
Brute force attack - accessing a protected resource by repeatedly attempting to guess the key to how it is protected
Common misconception
Hacking a computer system of someone you know as a joke is considered legal.
Even if there is no intention to commit a crime by accessing the computer system of someone you know, the fact that the access is unauthorised is considered a crime.
To help you plan your year 9 computing lesson on: Hacking and brute force attacks, download all teaching resources for free and adapt to suit your pupils' needs...
To help you plan your year 9 computing lesson on: Hacking and brute force attacks, download all teaching resources for free and adapt to suit your pupils' needs.
The starter quiz will activate and check your pupils' prior knowledge, with versions available both with and without answers in PDF format.
We use learning cycles to break down learning into key concepts or ideas linked to the learning outcome. Each learning cycle features explanations with checks for understanding and practice tasks with feedback. All of this is found in our slide decks, ready for you to download and edit. The practice tasks are also available as printable worksheets and some lessons have additional materials with extra material you might need for teaching the lesson.
The assessment exit quiz will test your pupils' understanding of the key learning points.
Our video is a tool for planning, showing how other teachers might teach the lesson, offering helpful tips, modelled explanations and inspiration for your own delivery in the classroom. Plus, you can set it as homework or revision for pupils and keep their learning on track by sharing an online pupil version of this lesson.
Explore more key stage 3 computing lessons from the Introduction to cybersecurity unit, dive into the full secondary computing curriculum, or learn more about lesson planning.
Equipment
Licence
Starter quiz
6 Questions
Exit quiz
6 Questions
legally testing the security of a system to protect it from attacks
a person that uses hacking to promote a political or social agenda
accessing systems or data without permission for malicious purposes
the unauthorised copying, transfer or retrieval of data from a system