Script kiddies

In this lesson you will explore the concept of hacking and the techniques used by hackers to exploit computer systems. We'll also look at the consequences of hacking and what laws are in place to act as a deterrent.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Q1.Which one of the following best describes social engineering?

1/4

Q2."An attack that involves an attacker watching the victim while they provide sensitive information" is a description of which of the following?

2/4

Q3.Which of the following is when attackers create short, fun quizzes in an attempt to find out key pieces of information that can help them answer account security questions?

3/4

Q4.You receive an email from an unknown sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?

4/4

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Q1.Which one of the following best describes social engineering?

1/4

Q2."An attack that involves an attacker watching the victim while they provide sensitive information" is a description of which of the following?

2/4

Q3.Which of the following is when attackers create short, fun quizzes in an attempt to find out key pieces of information that can help them answer account security questions?

3/4

Q4.You receive an email from an unknown sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?

4/4

Video

Click on the play button to start the video. If your teacher asks you to pause the video and look at the worksheet you should:

  • Click "Close Video"
  • Click "Next" to view the activity

Your video will re-appear on the next page, and will stay paused in the right place.

Worksheet

These slides will take you through some tasks for the lesson. If you need to re-play the video, click the ‘Resume Video’ icon. If you are asked to add answers to the slides, first download or print out the worksheet. Once you have finished all the tasks, click ‘Next’ below.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Script kiddies –

Helping you to assess what you have learnt throughout this lesson

Q1.‘Gaining unauthorised access to or control of a computer system’ is a definition of which type of cybercrime?

1/5

Q2.What is the term for people who are paid to legally hack into computer systems with the sole purpose of helping a company identify weaknesses in their system?

2/5

Q3.What is the purpose of a DDoS attack?

3/5

Q4.Which one of the following UK laws would a DDoS attack violate?

4/5

Q5.A hackers successfully hacks into a bank account and transfers money into another account whilst they are there. Which section of the Computer Misuse Act would this contravene?

5/5

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Script kiddies –

Helping you to assess what you have learnt throughout this lesson

Q1.‘Gaining unauthorised access to or control of a computer system’ is a definition of which type of cybercrime?

1/5

Q2.What is the term for people who are paid to legally hack into computer systems with the sole purpose of helping a company identify weaknesses in their system?

2/5

Q3.What is the purpose of a DDoS attack?

3/5

Q4.Which one of the following UK laws would a DDoS attack violate?

4/5

Q5.A hackers successfully hacks into a bank account and transfers money into another account whilst they are there. Which section of the Computer Misuse Act would this contravene?

5/5

Lesson summary: Script kiddies

It looks like you have not completed one of the quizzes.

To share your results with your teacher please complete one of the quizzes.

Time to move!

Did you know that exercise helps your concentration and ability to learn?

For 5 mins...

Move around:
Walk

On the spot:
Dance

The next lesson in:
Cybersecurity
is:
Rise of the bots

Browse Oak's lessons: