New
New
Year 11
AQA

Social engineering techniques

I can describe social engineering and explain the techniques used in social engineering.

New
New
Year 11
AQA

Social engineering techniques

I can describe social engineering and explain the techniques used in social engineering.

These resources will be removed by end of Summer Term 2025.

Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.

These resources were created for remote use during the pandemic and are not designed for classroom teaching.

Lesson details

Key learning points

  1. Social engineering is a cybercrime that manipulates people into revealing confidential information.
  2. Social engineering targets human psychology rather than exploiting technical systems.
  3. There are many different social engineering techniques such as blagging, phishing and pharming.

Keywords

  • Social engineering - a method used by cybercriminals to trick people into giving away confidential information

  • Cybercriminal - a person who uses computers, networks or digital devices to commit illegal activities online

  • Human error - a mistake made by people that accidentally leads to security breaches, data leaks, or other cyber incidents

Common misconception

Social engineering only involves technical hacking or complex cyberattacks.

Social engineering mainly targets human psychology, not technical vulnerabilities. It's more about exploiting trust and human error than technical skills.


To help you plan your year 11 computer science lesson on: Social engineering techniques, download all teaching resources for free and adapt to suit your pupils' needs...

Use real life scenarios or role playing activities to help students understand how social engineering works. For example, simulate a phishing email or fake phone call and have students identify red flags and discuss what they would do.
Teacher tip

Equipment

Licence

This content is © Oak National Academy Limited (2025), licensed on Open Government Licence version 3.0 except where otherwise stated. See Oak's terms & conditions (Collection 2).

Lesson video

Loading...

Prior knowledge starter quiz

Download quiz pdf

6 Questions

Q1.
What is a common impact of cybercrime on individuals and businesses?
increased trust in digital systems
improved mental well-being
reduced online activity
Correct answer: financial loss
Q2.
How can cyberattacks impact public safety?
by improving digital security
by reducing fear in society
Correct answer: by stopping essential services
by increasing trust in governments
Q3.
What motivates some hackers to carry out cybercrime?
only financial gain
only curiosity
only revenge
Correct answer: a range of factors
Q4.
What is the term for illegal activities involving computers or networks?
Correct Answer: cybercrime, cyber crime
Q5.
Who uses their computer skills to access systems or networks, sometimes to fix problems and sometimes to cause harm?
Correct Answer: hacker, a hacker, hackers
Q6.
Match the impacts to their descriptions:
Correct Answer:financial loss,loss of money due to cybercrime

loss of money due to cybercrime

Correct Answer:reduced trust,fear and lack of confidence in digital systems

fear and lack of confidence in digital systems

Correct Answer:public safety,disruption of essential services

disruption of essential services

Assessment exit quiz

Download quiz pdf

6 Questions

Q1.
What does social engineering mainly target?
firewalls
Correct answer: human psychology
technical systems
encryption methods
Q2.
Why is it important to recognise social engineering techniques?
Correct answer: to prevent data breaches and protect information
to improve technical systems
to strengthen encryption
to avoid using technology
Q3.
Match the techniques to their descriptions:
Correct Answer:blagging,pretending to be someone else to gain information

pretending to be someone else to gain information

Correct Answer:phishing,sending fake emails or messages

sending fake emails or messages

Correct Answer:pharming,redirecting users to fake websites

redirecting users to fake websites

Correct Answer:social engineering,manipulating people to reveal confidential information

manipulating people to reveal confidential information

Q4.
What is the term for watching someone enter their PIN or password to gain unauthorised access?
Correct Answer: shouldering
Q5.
What is a name generator attack?
creates usernames for accounts
hacks passwords with software
encrypts sensitive data
Correct answer: tricks people via quizzes or surveys
Q6.
Why is social engineering effective?
it uses advanced technical tools
it avoids targeting people
it relies solely on hacking systems
Correct answer: it exploits trust and human emotions