Social engineering
I can describe how social engineering is used to steal data and the steps that can be taken to stop it.
Social engineering
I can describe how social engineering is used to steal data and the steps that can be taken to stop it.
These resources will be removed by end of Summer Term 2025.
Lesson details
Key learning points
- Human error can be a risk to data security.
- Social engineering methods trick people into sharing information that can be used for fraudulent purposes.
- Name generator attacks, phishing and blagging are all social engineering methods.
- Social engineering attacks can be reduced through educating users of technology.
Keywords
Social engineering - the process of tricking people to reveal data that should be kept private
Name generator attacks - a method of collecting personal data by asking questions under the guise of generating a fun name
Phishing - messages or communication made to look like it is from an expected sender but linking to a website that steals data
Blagging - creating a story to trick someone into giving away their information or money
Common misconception
Social engineering involves technical skills and knowledge of computing concepts in order to carry out an attack.
Social engineering relies on manipulating a victim to steal their personal data. This is done by finding ways to trick the user in to handing over the data willingly.
To help you plan your year 9 computing lesson on: Social engineering, download all teaching resources for free and adapt to suit your pupils' needs...
To help you plan your year 9 computing lesson on: Social engineering, download all teaching resources for free and adapt to suit your pupils' needs.
The starter quiz will activate and check your pupils' prior knowledge, with versions available both with and without answers in PDF format.
We use learning cycles to break down learning into key concepts or ideas linked to the learning outcome. Each learning cycle features explanations with checks for understanding and practice tasks with feedback. All of this is found in our slide decks, ready for you to download and edit. The practice tasks are also available as printable worksheets and some lessons have additional materials with extra material you might need for teaching the lesson.
The assessment exit quiz will test your pupils' understanding of the key learning points.
Our video is a tool for planning, showing how other teachers might teach the lesson, offering helpful tips, modelled explanations and inspiration for your own delivery in the classroom. Plus, you can set it as homework or revision for pupils and keep their learning on track by sharing an online pupil version of this lesson.
Explore more key stage 3 computing lessons from the Introduction to cybersecurity unit, dive into the full secondary computing curriculum, or learn more about lesson planning.
Equipment
Licence
Starter quiz
6 Questions
facts and figures in raw form
structured data with meaning
information about a specific person
a set of laws passed by parliament