How to detect phishing ESO
Acerina
Created on February 8, 2021
More creations to inspire you
MARVEL SUPERHEROES QUIZ
Personalized
TANGRAM QUIZ
Personalized
CARNIVAL QUIZ
Personalized
LEGO QUIZ
Personalized
MATH PIRATES QUIZ
Personalized
FIND THE PAIR - MEMORY GAME
Personalized
GUESS THE KPOP SONG!
Personalized
Transcript
Fly or fall!
Phishing
start
Acerina Moran
Choose a question!
1
2
3
4
5
6
7
8
9
10
10
END
ContinuE
¡¡CORRECT!!
Try again!
question 01
What is phishing?
one of the most common methods of whistling
the act of steping on someone´s foot
one of the most common methods of cyber crime
The goal is to trick the email recipient into believing that the message is something they want or need
Phishing is a cyber attack that uses disguised email as a weapon.
For example: a request from their bank, or a note from someone they knowto click a link or download an attachment
QUESTION 02
A legitimate organisation will always send emails from:
A private email domain
A public email domain
an @gmail.com domain
No legitimate organisation will send emails from an address that ends ‘@gmail.com’. Not even Google. Most organisations, except some small operations, willhave their own email domain and company accounts. For example, legitimate emails from Google will read ‘@google.com’.If the domain name (the bit after the @ symbol) matches the apparent sender of the email, the message is probably legitimate. The best way to check an organisation’s domain name is to type the company’s name into a search engine.
QUESTION 03
In a phishing email, cybercriminals will typically ask for your:
Credit card details andPassword information (or what they need to reset your password)
Full name and survey opinions
Phishing victims are tricked into disclosing information they know should be kept private. However, because they trust the source of the information request and believe that party is acting with the best intentions, phishing email victims respond without thinking twice about it.In a phishing email, cybercriminals will typically ask for your:Date of birth Social security numbers Phone numbers Credit card details Home address Password information (or what they need to reset your password This information is then used by cybercriminals to impersonate the victim and apply for credit cards or loans, open bank accounts, and other fraudulent activity.
Question 04
Examples of requested actions in a phishing email include:
Reply to the email
Clicking an attachment
Responding to a social media connection request
Phishing happens when a victim replies to a fraudulent email that demands urgent action. Examples of requested actions in a phishing email include: Clicking an attachment Enabling macros in Word document Updating a password Responding to a social media connection request Using a new wi-fi hot spot. Every year, cybercriminals become savvier with their phishing attacks and have tried-and-tested methods to deceive and steal from innocent victims. Because phishing attacks come in many different forms, differentiating one from a valid email, voice mail, text message, or information request can be difficult.
QUESTION 05
You receive an email from your teacher. She asks for the name, telephone numbers and addresses of your family members. The email says it’s urgent and to please reply right away. You should reply right away. Right? True or False?
TrUE
ONLY if you like the teacher
FALSE
It may be a phishing attempt. Check it out first by comparing the email address with the one your teacher provided in class. If it matches, you can alsoconfirm whether the request was really from your teacher by talking to your classmates
QUESTION 06
You get a text message from a vendor who asks you to click on a link to renew your password so that you can log in to its website. You should:
Reply to the text to confirm that you really need to renew your password
Call the vendor, using a phone number you know to be correct, to confirm that the request is real
Click on the link. If it takes you to the vendor’s website, then you’ll know it’s not a scam
The best way to confirm that the request is real is to call your vendor using a number you know to be correct. Do not reply to the text itself or use a number in the text, or else you might just wind up talking to a scammer.
Question 07
If you fall for a phishing scam, what should you do to limit the damage?
Delete the phishing email
Change any compromised passwords
Unplug the computer. This will get rid of any malware
To limit the damage you should immediately change any compromised passwords and disconnect from the network any computer or device that could be infected with malware because of the phishing attack. Deleting the email will not stop any damage the attack may have caused.
Question 08
Email authentication can help protect against phishing attacks. True or False?
TRUE
FALSE
Email authentication technology helps prevent phishing emails from reaching your company’s inboxes.
Question 09
Is the image below of a real email or phishing email?
PHishing
REAL
- The email is addressed to you personally (using your complete name) - It comes from an official private email (you can check if the email is offical by researching the name of the company and comparing the email to others you might have received from them)- It does not include spelling and/or grammatical errors - The email was not sent at an odd hour - It does not include an unrealistic offer - It does not include a request for a donation
Question 10
Should you trust this email?
YES
Microscopio
NO WAY
Apple ID is not a real Apple email address.Phishing tips• Avoid strangers, check name and email address• Don’t rush, be suspicious of emails marked “urgent”• Notice mistakes in spelling and grammar• Beware of generic greetings, “dear sir/ma’am”• Don’t be lured by incredible “deals”• Hover over the link before you click to ensure it has a secureURL (https://)• Never give out personal or financial information based on anemail request• Don’t trust links or attachments in unsolicited emails
CONGRATS! well done!
Be smart, check before you reply or clic! Protect yourself against phishing!
3-4 RESPUESTAS CORRECTAS Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat.