Non-automated cybercrime

In this lesson, we will distinguish between non-automated and automated cybercrime. We will be introduced to the idea that humans are the weakest link in the security chain before exploring different types of social engineering.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Q1.Which of these sentences most accurately defines cybersecurity?

1/3

Q2.Which of these sentences defines an ethical hacker?

2/3

Q3.Which of the sentences below most accurately describes hacktivists?

3/3

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Q1.Which of these sentences most accurately defines cybersecurity?

1/3

Q2.Which of these sentences defines an ethical hacker?

2/3

Q3.Which of the sentences below most accurately describes hacktivists?

3/3

Video

Click on the play button to start the video. If your teacher asks you to pause the video and look at the worksheet you should:

  • Click "Close Video"
  • Click "Next" to view the activity

Your video will re-appear on the next page, and will stay paused in the right place.

Worksheet

These slides will take you through some tasks for the lesson. If you need to re-play the video, click the ‘Resume Video’ icon. If you are asked to add answers to the slides, first download or print out the worksheet. Once you have finished all the tasks, click ‘Next’ below.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Non-Automated Cybercrime –

Don’t worry if you get a question wrong! Forgetting is an important step in learning. We will recap next lesson.

Q1.Which of the sentences below most accurately represents social engineering in cybersecurity?

1/3

Q2.The following sentence is a description of which social engineering attack? "Trying to obtain confidential records such as passwords by sending emails that look as if they are from a legitimate, respected organisation, but contain links to fake websites that take data from their unsuspecting victims"

2/3

Q3.The following sentence is a description of which social engineering attack? "Redirects victims to a bogus site even if the victim has typed the correct web address. This type of scam is often applied to the websites of banks or e-commerce sites."

3/3

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Non-Automated Cybercrime –

Don’t worry if you get a question wrong! Forgetting is an important step in learning. We will recap next lesson.

Q1.Which of the sentences below most accurately represents social engineering in cybersecurity?

1/3

Q2.The following sentence is a description of which social engineering attack? "Trying to obtain confidential records such as passwords by sending emails that look as if they are from a legitimate, respected organisation, but contain links to fake websites that take data from their unsuspecting victims"

2/3

Q3.The following sentence is a description of which social engineering attack? "Redirects victims to a bogus site even if the victim has typed the correct web address. This type of scam is often applied to the websites of banks or e-commerce sites."

3/3

Lesson summary: Non-automated cybercrime

It looks like you have not completed one of the quizzes.

To share your results with your teacher please complete one of the quizzes.

Time to move!

Did you know that exercise helps your concentration and ability to learn?

For 5 mins...

Move around:
Walk

On the spot:
Dance

The next lesson in:
Security
is:
Automated cybercrime

Browse Oak's lessons: