Non-automated cybercrime

In this lesson you will distinguish between non-automated and automated cybercrime. You will be introduced to the idea that humans are the weakest link in the security chain before exploring different types of social engineering.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Question 1

Question 2

Question 3

Q1.Which of these sentences most accurately defines cybersecurity?

1/3

Q2.Which of these sentences defines an ethical hacker?

2/3

Q3.Which of the sentences below most accurately describes hacktivists?

3/3

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Question 1

Question 2

Question 3

Q1.Which of these sentences most accurately defines cybersecurity?

1/3

Q2.Which of these sentences defines an ethical hacker?

2/3

Q3.Which of the sentences below most accurately describes hacktivists?

3/3

Video

Click on the play button to start the video. If your teacher asks you to pause the video and look at the worksheet you should:

  • Click "Close Video"
  • Click "Next" to view the activity

Your video will re-appear on the next page, and will stay paused in the right place.

Worksheet

These slides will take you through some tasks for the lesson. If you need to re-play the video, click the ‘Resume Video’ icon. If you are asked to add answers to the slides, first download or print out the worksheet. Once you have finished all the tasks, click ‘Next’ below.

Quiz:

Non-Automated Cybercrime –

Don’t worry if you get a question wrong! Forgetting is an important step in learning. We will recap next lesson.

Question 1

Question 2

Question 3

Q1.Which of the sentences below most accurately represents social engineering in cybersecurity?

1/3

Q2.The following sentence is a description of which social engineering attack? "Trying to obtain confidential records such as passwords by sending emails that look as if they are from a legitimate, respected organisation, but contain links to fake websites that take data from their unsuspecting victims"

2/3

Q3.The following sentence is a description of which social engineering attack? "Redirects victims to a bogus site even if the victim has typed the correct web address. This type of scam is often applied to the websites of banks or e-commerce sites."

3/3

Quiz:

Non-Automated Cybercrime –

Don’t worry if you get a question wrong! Forgetting is an important step in learning. We will recap next lesson.

Question 1

Question 2

Question 3

Q1.Which of the sentences below most accurately represents social engineering in cybersecurity?

1/3

Q2.The following sentence is a description of which social engineering attack? "Trying to obtain confidential records such as passwords by sending emails that look as if they are from a legitimate, respected organisation, but contain links to fake websites that take data from their unsuspecting victims"

2/3

Q3.The following sentence is a description of which social engineering attack? "Redirects victims to a bogus site even if the victim has typed the correct web address. This type of scam is often applied to the websites of banks or e-commerce sites."

3/3

Lesson summary: Non-automated cybercrime

It looks like you have not attempted both the quizzes.

To share your results with your teacher please complete both the quizzes.

The next lesson in Security is "Automated cybercrime"

Browse Oak's lessons: