Social engineering

In this lesson, we will become aware of how humans can be a weak point in the system. We will look at the social engineering tactics deployed by cybercriminals to dupe users into giving away data that could lead to further crime.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Q1.When data has been processed and is meaningful, which of these has it become?

1/5

Q2.Is the following data or information: "Sophie got 38 out of 40 on her English test"

2/5

Q3.Why might a company collect information about you to form a profile? (Which two of the following apply?)

Select two (2) boxes

3/5

Q4.What is the purpose of the Data Protection Act?

4/5

Q5.One of your rights under the Data Protection Act is to have your data deleted. Do you have the right to ask a your school to delete all of the information it stores on you?

5/5

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Q1.When data has been processed and is meaningful, which of these has it become?

1/5

Q2.Is the following data or information: "Sophie got 38 out of 40 on her English test"

2/5

Q3.Why might a company collect information about you to form a profile? (Which two of the following apply?)

Select two (2) boxes

3/5

Q4.What is the purpose of the Data Protection Act?

4/5

Q5.One of your rights under the Data Protection Act is to have your data deleted. Do you have the right to ask a your school to delete all of the information it stores on you?

5/5

Video

Click on the play button to start the video. If your teacher asks you to pause the video and look at the worksheet you should:

  • Click "Close Video"
  • Click "Next" to view the activity

Your video will re-appear on the next page, and will stay paused in the right place.

Worksheet

These slides will take you through some tasks for the lesson. If you need to re-play the video, click the ‘Resume Video’ icon. If you are asked to add answers to the slides, first download or print out the worksheet. Once you have finished all the tasks, click ‘Next’ below.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Social engineering –

Helping you to assess what you have learnt throughout this lesson

Q1.Which one of the following best describes social engineering?

1/4

Q2."An attack that involves an attacker watching the victim while they provide sensitive information" is a description of which of the following?

2/4

Q3.Which of the following is when attackers create short, fun quizzes in an attempt to find out key pieces of information that can help them answer account security questions?

3/4

Q4.You receive an email from an unknown sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?

4/4

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Social engineering –

Helping you to assess what you have learnt throughout this lesson

Q1.Which one of the following best describes social engineering?

1/4

Q2."An attack that involves an attacker watching the victim while they provide sensitive information" is a description of which of the following?

2/4

Q3.Which of the following is when attackers create short, fun quizzes in an attempt to find out key pieces of information that can help them answer account security questions?

3/4

Q4.You receive an email from an unknown sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?

4/4

Lesson summary: Social engineering

It looks like you have not completed one of the quizzes.

To share your results with your teacher please complete one of the quizzes.

Time to move!

Did you know that exercise helps your concentration and ability to learn?

For 5 mins...

Move around:
Walk

On the spot:
Chair yoga

The next lesson in:
Cybersecurity
is:
Script kiddies

Browse Oak's lessons: