Year 10
These resources will be removed by end of Summer Term 2025.
Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.
Lesson details
Key learning points
- In this lesson, we will distinguish between non-automated and automated cybercrime. We will be introduced to the idea that humans are the weakest link in the security chain before exploring different types of social engineering.
Licence
This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.
Loading...
3 Questions
Q1.
Which of these sentences most accurately defines cybersecurity?
Any activity designed to protect the usability and integrity of a network and its data by managing access to the network.
Designing programs that are less vulnerable to cyberattack.
Ensuring that all staff are adequately trained to protect an organisation.
Q2.
Which of these sentences defines an ethical hacker?
An individual who is inexperienced but interested in a career in IT.
An individual who may seek financial reward for finding vulnerabilities but is more interested in finding the vulnerabilities than the reward.
An individual who will violate computer security for malicious or financial reasons, AKA cracker.
Q3.
Which of the sentences below most accurately describes hacktivists?
Individuals who don’t care about money.
Individuals who organise mass walkouts and protests.
Individuals who will stop at nothing to get their message across.
3 Questions
Q1.
Which of the sentences below most accurately represents social engineering in cybersecurity?
A discipline in social science that refers to efforts to influence particular attitudes and social behaviours on a large scale to produce desired characteristics in a target population
Getting information from people by promising them things
Manipulating people on the telephone
Q2.
The following sentence is a description of which social engineering attack? "Trying to obtain confidential records such as passwords by sending emails that look as if they are from a legitimate, respected organisation, but contain links to fake websites that take data from their unsuspecting victims"
Blagging
Name generator attack
Pharming
Q3.
The following sentence is a description of which social engineering attack? "Redirects victims to a bogus site even if the victim has typed the correct web address. This type of scam is often applied to the websites of banks or e-commerce sites."
Blagging
Name generator attack
Phishing