Year 9 - Cybersecurity - Lesson 6

Do Now! Under Attack Prep

Warm up for the Under Attack game by spotting the clue in each incident, naming the attack, and choosing the protection that would help most.

Complete Activities 1-3 in order. Use your cyber knowledge, then click each Check button to see how ready your team is.

Today's Big Idea

Good cyber defence starts with two smart moves: identify the threat and match it to the right protection.

Think like the defence team

Activity 1: Name The Attack

Read each new scenario and choose the cyber attack that best matches it. The attack names stay the same as the game, but the examples are different.

A caller claims to be from the exam board and says they need a teacher's username and password to upload urgent coursework.

A school's shared drive suddenly becomes inaccessible and a note appears demanding payment in cryptocurrency to restore the files.

The school's revision website becomes unusable because thousands of connection requests are arriving every second from computers around the world.

The admin account on a school system shows hundreds of failed login attempts in a few minutes, each with a slightly different password.

After downloading a free video converter, a student finds that every browser tab is full of adverts and pop-ups.

A teacher's laptop seems normal, but saved passwords and private documents have been quietly copied and sent elsewhere.

Activity 2: Pick The Best Protection

Choose the most suitable protection for each fresh scenario. The protection names match the game, but the examples are different.

A sixth form student reuses the same password on several sites, and one of those sites has been breached.

A department's coursework folder has been corrupted overnight and the school needs a clean copy of the files.

An online parents' evening booking system is being overwhelmed by massive amounts of hostile internet traffic.

A school portal is getting hammered by automated login attempts from bots trying different usernames and passwords.

A laptop is showing signs of hidden malicious software, including suspicious pop-ups and unusual background activity.

A downloaded attachment contains an infected file that tries to spread itself to other computers on the network.

Activity 3: Attack + Defence Link

For each incident, choose both the attack and the best supporting protection. This is the exact thinking you will need in the game.

Incident A

The company's social media account starts posting messages the business did not write.

Incident B

Hackers are trying to access the company accounts system in order to transfer money out.

Incident C

A suspicious email link leads to a ransom message. The team wants to reduce the chance of the software being exploited again.

Download Your Results

Enter your name, then download a color-coded PDF report of your answers.