Watch and follow the YouTube video, the lesson contains three parts:
Key Information and content - all you need to do here is watch and listen.
Learning activity - there are two activities to complete. One task is preparing you to see the signs of a phishing email and the second is a task where you need to brute force a password.
Consolidation - these are past exam question and are for deliberate practice to check your understanding.
 Social Engineering, Data Interception and Brute Force Attacks Full Lesson Video.mp4
Social Engineering, Data Interception and Brute Force Attacks Full Lesson Video.mp41 mark for description, 1 mark for prevention
Max 2 per threat
Data interception / passive
Data is sent to another device and is intercepted by a third party
Encryption
Phishing
An e-mail has a link that when clicked directs the user to a fake website that collects personal data
Network policy // firewall
Brute force attack
Person/software using every combination of passwords to gain access
Firewall//strong passwords