Lesson details

Key learning points

  1. In this lesson, we will distinguish between non-automated and automated cybercrime. We will be introduced to the idea that humans are the weakest link in the security chain before exploring different types of social engineering.


This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.


3 Questions

Which of these sentences most accurately defines cybersecurity?
Any activity designed to protect the usability and integrity of a network and its data by managing access to the network.
Designing programs that are less vulnerable to cyberattack.
Ensuring that all staff are adequately trained to protect an organisation.
Correct answer: The practice of protecting systems, networks, and programs from digital attacks.
Which of these sentences defines an ethical hacker?
An individual who is inexperienced but interested in a career in IT.
An individual who may seek financial reward for finding vulnerabilities but is more interested in finding the vulnerabilities than the reward.
An individual who will violate computer security for malicious or financial reasons, AKA cracker.
Correct answer: An individual whose activities are designed to test and enhance computer security, AKA ethical hacker.
Which of the sentences below most accurately describes hacktivists?
Individuals who don’t care about money.
Individuals who organise mass walkouts and protests.
Correct answer: Individuals who use technology to announce a social, ideological, religious, or political message.
Individuals who will stop at nothing to get their message across.

3 Questions

Which of the sentences below most accurately represents social engineering in cybersecurity?
A discipline in social science that refers to efforts to influence particular attitudes and social behaviours on a large scale to produce desired characteristics in a target population
Getting information from people by promising them things
Manipulating people on the telephone
Correct answer: The psychological manipulation of people into performing actions or divulging confidential information
The following sentence is a description of which social engineering attack? "Trying to obtain confidential records such as passwords by sending emails that look as if they are from a legitimate, respected organisation, but contain links to fake websites that take data from their unsuspecting victims"
Name generator attack
Correct answer: Phishing
The following sentence is a description of which social engineering attack? "Redirects victims to a bogus site even if the victim has typed the correct web address. This type of scam is often applied to the websites of banks or e-commerce sites."
Name generator attack
Correct answer: Pharming