Under attack

In this lesson, we will apply the knowledge that we have gained in this unit by playing a game called Under Attack where we will have to defend a network from incoming threats. We will also research the available career choices in cyber defence.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Q1.A firewall checks incoming and outgoing network traffic

1/5

Q2.Which of the following would be the most appropriate software to identify when you system becomes infected with worms, spyware and other forms of computer viruses?

2/5

Q3.Which of the following is a method of verifying that a login attempt has been made by the account owner?

3/5

Q4.Which of the following attempts to check if you are a human user and not a malicious bot.

4/5

Q5.Which of the following would be the correct term for a large collection of malware-infected devices (zombies) used to perform an attack or to exploit known weaknesses in a system?

5/5

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Q1.A firewall checks incoming and outgoing network traffic

1/5

Q2.Which of the following would be the most appropriate software to identify when you system becomes infected with worms, spyware and other forms of computer viruses?

2/5

Q3.Which of the following is a method of verifying that a login attempt has been made by the account owner?

3/5

Q4.Which of the following attempts to check if you are a human user and not a malicious bot.

4/5

Q5.Which of the following would be the correct term for a large collection of malware-infected devices (zombies) used to perform an attack or to exploit known weaknesses in a system?

5/5

Video

Click on the play button to start the video. If your teacher asks you to pause the video and look at the worksheet you should:

  • Click "Close Video"
  • Click "Next" to view the activity

Your video will re-appear on the next page, and will stay paused in the right place.

Worksheet

These slides will take you through some tasks for the lesson. If you need to re-play the video, click the ‘Resume Video’ icon. If you are asked to add answers to the slides, first download or print out the worksheet. Once you have finished all the tasks, click ‘Next’ below.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Under attack

Helping you to assess what you have learnt throughout this unit

Q1.Which UK law gives you the right to access the data an organisation stores on you?

1/14

Q2.When data has been processed and is meaningful, which of these has it become?

2/14

Q3.What is social engineering?

3/14

Q4.You receive an email from an unknown sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?

4/14

Q5.Which of the following describes a name generator attack?

5/14

Q6.‘Gaining unauthorised access to or control of a computer system’ is a definition of which type of cybercrime?

6/14

Q7.What is the term for people who are paid to legally hack into computer systems with the sole purpose of helping a company identify weaknesses in their system?

7/14

Q8.What is the purpose of a DDoS attack?

8/14

Q9.Which of the following passwords would be the best defence against a brute force attack?

9/14

Q10.Which one of the following UK laws would a DDoS attack violate?

10/14

Q11.Which three of the following are types of malware?

Select three (3) boxes

11/14

Q12.What is the definition of a computer virus?

12/14

Q13.Which of the following is a method of verifying that a login attempt has been made by the account owner?

13/14

Q14.Software that checks incoming and outgoing traffic on a network to check for malicious code is known as what?

14/14

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Under attack

Helping you to assess what you have learnt throughout this unit

Q1.Which UK law gives you the right to access the data an organisation stores on you?

1/14

Q2.When data has been processed and is meaningful, which of these has it become?

2/14

Q3.What is social engineering?

3/14

Q4.You receive an email from an unknown sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?

4/14

Q5.Which of the following describes a name generator attack?

5/14

Q6.‘Gaining unauthorised access to or control of a computer system’ is a definition of which type of cybercrime?

6/14

Q7.What is the term for people who are paid to legally hack into computer systems with the sole purpose of helping a company identify weaknesses in their system?

7/14

Q8.What is the purpose of a DDoS attack?

8/14

Q9.Which of the following passwords would be the best defence against a brute force attack?

9/14

Q10.Which one of the following UK laws would a DDoS attack violate?

10/14

Q11.Which three of the following are types of malware?

Select three (3) boxes

11/14

Q12.What is the definition of a computer virus?

12/14

Q13.Which of the following is a method of verifying that a login attempt has been made by the account owner?

13/14

Q14.Software that checks incoming and outgoing traffic on a network to check for malicious code is known as what?

14/14

Lesson summary: Under attack

It looks like you have not completed one of the quizzes.

To share your results with your teacher please complete one of the quizzes.

Time to move!

Did you know that exercise helps your concentration and ability to learn?

For 5 mins...

Move around:
Walk

On the spot:
Chair yoga

This was the final lesson in the unit Cybersecurity.

Browse Oak's lessons: