Introduction to Cybersecurity
Lesson 8 of 15

Lesson 8

Lesson 3.2 - Be Vigilant: Recognising and Preventing Cyber Threats


In this lesson, you will…

Mitigate risks of social engineering attempts by selecting defensive actions.

Reflect on strategies to respond to social engineering attempts with confidence and professionalism.

INTRODUCTION

Sometimes, attackers don’t try to hack your computer, they try to hack you.

Social engineering is manipulating people into revealing confidential information through deception and trust exploitation.

ACTIVITY READING

Common Social Engineering Tactics

Click to expand each section below to learn more.

  • 🚩 They pressure you without official verification.

    👁️ I'm from IT, please give me your login so we can fix a system issue.

  • 🚩 They try to rush you into a decision.

    👁️ Reset your password NOW or lose access!

  • 🚩 They ask for information you usually wouldn’t share casually.

    👁️ Can you quickly send the staff list or student schedules?

  • 🚩 They seem helpful but push boundaries quickly.

    👁️ Friendly, casual conversation that leads into unusual requests.

If you feel rushed, pressured, or a little uncertain, trust but verify before you act.

Politely reinforce your school’s protocols, those with good intentions will recognize your professionalism and accountability.

[caption id="" align="alignnone" width="500"] Trust, but verify. Trust, but verify. [/caption]

SHOW WHAT YOU KNOW

Take a moment to recall what you have learnt.

When you are ready, click the button to begin the activity.

JOIN THE CONVERSATION

Confidence and Professionalism

Sometimes, social engineering doesn’t look suspicious at all. It might feel like a friendly request, a casual conversation or someone just trying to make your day easier.

That’s what makes it effective.

The challenge is this: how to be confident and professional without seeming rude or unhelpful?

The answer is to politely and calmly mirror the tone while maintaining your boundaries. You can be calm, kind, and clear.

  • I’d love to help, I will take you through to the front office to verify your request.

  • Yes of course! I know the right contact, come with me.

  • I’m so sorry, if I share my login I will lose access. I can make a request for you?

These phrases defuse the awkwardness, reinforce protocol and protect your reputation.

Take a moment to think and respond to the following:

Which strategies you feel most comfortable and confident with should you find yourself in a social engineering situation.