0% found this document useful (0 votes)
31 views

Social Engineering

Social Engineering

Uploaded by

17ahe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Social Engineering

Social Engineering

Uploaded by

17ahe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Year 9 – Cybersecurity

Social engineering
Activity 1: Phishing

A phishing attack is an attack in which the victim receives an email disguised to look
as if it has come from a reputable source, in order to trick them into giving up
valuable data.

The email usually provides a link to another website where the information can be
inputted.

What three pieces of advice would you give to someone to stop them from becoming
the victim of a phishing attack?

1.

2.

3.

Page 1 Last updated: 21-05-21


Activity 2: Blagging

Underline and number the parts of the email that make it suspicious; complete the
table below to describe why it’s suspicious (an example has been provided).

Number Reason

1.

2.

3.

Page 2
Activity 3: Protecting your customers

Put yourself in the shoes of the cybersecurity team of a national bank. Your job is to
try to prevent your customers becoming victims of social engineering.

4.1. Complete the information poster below.

Shouldering

Keep your pins and passwords safe from


shouldering.

What is shouldering?

What can I do to stop myself becoming a victim?

Page 3
4.2 Blagging/phishing email

Write a short blagging email that tries to convince the recipient that they need to
send you some money. Add in some obvious characteristics that are common in
blagging emails.

Give advice to the customers on how to spot a blagging or phishing email.

Scam email warning!

Three ways to spot a scam email:

1.

2.

3.

Page 4
Explorer activity

Using the links to the UK National Cyber Security website to help you, answer the
following questions:

Question Your answer

Describe what is
meant by the term
‘spear phishing’?

(https://
www.ncsc.gov.uk/
guidance/phishing)

Read the advice about


spotting phishing
emails. What tips did
you find that you
haven’t listed in the
advice you gave in
task 4.2?

(https://
www.ncsc.gov.uk/
guidance/suspicious-
email-actions)

What is two-factor
authentication?

(https://
www.ncsc.gov.uk/
guidance/setting-two-
factor-authentication-
2fa)

Page 5
Page 6

You might also like