Step-by-Step Lesson

Learn: Phishing - Recognising and Explaining the Attack

OCR GCSE J277 Computer Science specification

Ready to start this lesson?

Sign in to track your progress. 16 steps including 8 interactive questions.

Sign In to Start Learning
16 Steps8 Questions

Students also studied

Browse all

Steps in this lesson (16)

1
Text

Welcome!Welcome back! You've already learned about security threats, malware, and social engineering. Now, let's focus on phishing, a common type of social engineering attack. By the end of this lesson, you'll know how to recognise phishing attempts and explain how they work.

2
Text

What is Phishing?Phishing is a type of cyber attack where attackers try to trick people into revealing sensitive information, such as passwords, bank details, or personal data. This is often done using fake emails, messages, or websites that look legitimate.

3
Text

How Does Phishing Work?Phishing attacks usually involve sending a fake message (like an email) that directs the victim to a fraudulent website. The goal is to make the victim enter their personal information, which the attacker can then steal and misuse. These attacks rely on trust and urgency to trick people into acting quickly.

4
Multiple ChoiceInteractive

Which of the following best describes phishing?

Start the lesson to answer this multiple choice question

5
Text

Common Features of Phishing AttacksPhishing attempts often have the following characteristics:Fake messages that look like they are from trusted organisations, such as banks or online shops.Urgent language, like 'Your account will be locked!' to create panic.Links to fraudulent websites that mimic real ones.Requests for sensitive information, such as login details or payment information.

6
Fill in the BlankInteractive

Phishing attacks often use {{blank0}} language to make victims act quickly and send fake {{blank1}} that mimic trusted organisations.

Start the lesson to answer this fill in the blank question

7
Text

Recognising Phishing EmailsTo spot phishing attempts, look for these signs:Misspellings or grammar mistakes.Unusual sender email addresses (e.g., random characters).Links that don't match the organisation’s official website.Requests for personal or financial information.

8
MatchingInteractive

Match the items on the left with their correct pairs on the right

Start the lesson to answer this matching question

9
Text

Consequences of PhishingIf successful, phishing attacks can lead to:Stolen money or financial loss.Identity theft, where personal data is used without permission.Compromised accounts, such as email or social media.

10
Multiple ChoiceInteractive

Which of these is NOT a common feature of phishing attacks?

Start the lesson to answer this multiple choice question

11
Text

How to Protect Against PhishingHere are some steps to protect yourself:Verify links before clicking by hovering over them to see the real URL.Check the sender's email address carefully.Never share sensitive information through email or unknown websites.Use antivirus software and keep it updated.

12
Multi-SelectInteractive

Which of the following are effective ways to protect against phishing? (Select all that apply)

Start the lesson to answer this multi-select question

13
Text

Review Time!Great work! You've learned what phishing is, how it works, and how to protect against it. Let's test your understanding with a few final questions.

14
Multiple ChoiceInteractive

What is the main goal of phishing attacks?

Start the lesson to answer this multiple choice question

15
Fill in the BlankInteractive

Phishing often involves sending {{blank0}} emails to trick victims into entering their {{blank1}} details on fake websites.

Start the lesson to answer this fill in the blank question

16
MatchingInteractive

Match the items on the left with their correct pairs on the right

Start the lesson to answer this matching question

Genie

Want to Learn More?

Get personalised lessons, quizzes, and instant feedback from your AI tutor.

Explore More Topics