These resources will be removed by end of Summer Term 2025.

Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.

These resources were created for remote use during the pandemic and are not designed for classroom teaching.

Lesson details

Key learning points

  1. In this lesson, we will apply the knowledge that we have gained in this unit by playing a game called Under Attack where we will have to defend a network from incoming threats. We will also research the available career choices in cyber defence.

Licence

This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.

Loading...

Prior knowledge starter quiz

Download quiz pdf
Share with pupils

5 Questions

Q1.
A firewall checks incoming and outgoing network traffic

False
Correct answer: True

Q2.
Which of the following would be the most appropriate software to identify when you system becomes infected with worms, spyware and other forms of computer viruses?

Correct answer: Anti-malware
Anti-virus
CAPTCHA
Firewall

Q3.
Which of the following is a method of verifying that a login attempt has been made by the account owner?

CAPTCHA
Installing a firewall
Setting user permissions
Correct answer: Two-factor authentication

Q4.
Which of the following attempts to check if you are a human user and not a malicious bot.

Biometrics
Correct answer: CAPTCHA
Setting user permissions
Two factor authentication

Q5.
Which of the following would be the correct term for a large collection of malware-infected devices (zombies) used to perform an attack or to exploit known weaknesses in a system?

Correct answer: Botnet
DDoS
Penetration testing
Trojan

14 Questions

Q1.
Which UK law gives you the right to access the data an organisation stores on you?

The Computer Misuse Act
The Copyright, Designs, and Patents Act
Correct answer: The Data Protection Act
The Freedom of Information Act

Q2.
When data has been processed and is meaningful, which of these has it become?

Identifiable data
Correct answer: Information
Processed data
Profiled

Q3.
What is social engineering?

A malicious attempt to disrupt a server or network by flooding it with internet traffic
Hacking a system by taking control of someone else's computer
Correct answer: Methods used by cybercriminals to deceive individuals into handing over information
Using the computer of someone who has accidentally left themselves logged on

Q4.
You receive an email from an unknown sender asking for money. The sender wants you to respond to the email. There are no hyperlinks in the email, but it includes unusual use of English and there are a number of spelling mistakes. What type of social engineering attempt is this?

Correct answer: Blagging
Phishing
Shouldering
Spam

Q5.
Which of the following describes a name generator attack?

A form of identity theft conducted online
An attack that makes multiple attempts to guess a username and password
Correct answer: Attackers create an online quiz to produce a name; the answers to the quiz find out key pieces of information that can help them to answer the security questions protecting people's accounts
Software used to randomly create accounts that post to social media

Q6.
‘Gaining unauthorised access to or control of a computer system’ is a definition of which type of cybercrime?

Correct answer: Hacking
Phishing
Social engineering
Viruses

Q7.
What is the term for people who are paid to legally hack into computer systems with the sole purpose of helping a company identify weaknesses in their system?

Ethical hackers
Legal hackers
Correct answer: Penetration testers (pen testers)
System administrators

Q8.
What is the purpose of a DDoS attack?

To use a single computer to flood a network or server with internet traffic in order to disrupt service
To use a single computer to infiltrate a network in order to steal data or to plant a virus
Correct answer: To use multiple computers to flood a network or server with internet traffic in order to disrupt service
To use multiple computers to infiltrate a network in order to steal data or to plant a virus

Q9.
Which of the following passwords would be the best defence against a brute force attack?

Correct answer: P$tertherabb1t
P3tertherabb1t
peter1£@!
Petertherabbit

Q10.
Which one of the following UK laws would a DDoS attack violate?

Correct answer: The Computer Misuse Act
The Copyright, Designs, and Patents Act
The Data Protection Act
The Freedom of Information Act

Q11.
Which three of the following are types of malware?

Anti-virus
Firewall
Correct answer: Ransomware
Correct answer: Trojans
Correct answer: Worms

Q12.
What is the definition of a computer virus?

Malicious software that disguises itself as something else
Malicious software that monitors every keystroke the user makes
Correct answer: Malicious software that self-replicates
Malicious software that uses network bandwidth to deliberately disrupt the speed of the network

Q13.
Which of the following is a method of verifying that a login attempt has been made by the account owner?

CAPTCHA
Installing a firewall
Setting user permissions
Correct answer: Two-factor authentication

Q14.
Software that checks incoming and outgoing traffic on a network to check for malicious code is known as what?

Anti-malware
Anti-virus
Correct answer: Firewall
Two-factor authentication

Lesson appears in

UnitComputing / Cybersecurity

Computing