Want to make creations as awesome as this one?

Transcript

Fly or fall!

Phishing

start

Acerina Moran

Choose a question!

1

2

3

4

5

6

7

8

9

10

10

END

ContinuE

¡¡CORRECT!!

Try again!

question 01

What is phishing?

one of the most common methods of whistling

the act of steping on someone´s foot

one of the most common methods of cyber crime

The goal is to trick the email recipient into believing that the message is something they want or need

Phishing is a cyber attack that uses disguised email as a weapon.

For example: a request from their bank, or a note from someone they knowto click a link or download an attachment

QUESTION 02

A legitimate organisation will always send emails from:

A private email domain

A public email domain

an @gmail.com domain

No legitimate organisation will send emails from an address that ends ‘@gmail.com’. Not even Google. Most organisations, except some small operations, willhave their own email domain and company accounts. For example, legitimate emails from Google will read ‘@google.com’.If the domain name (the bit after the @ symbol) matches the apparent sender of the email, the message is probably legitimate. The best way to check an organisation’s domain name is to type the company’s name into a search engine.

QUESTION 03

In a phishing email, cybercriminals will typically ask for your:

Credit card details andPassword information (or what they need to reset your password)

Full name and survey opinions

Phishing victims are tricked into disclosing information they know should be kept private. However, because they trust the source of the information request and believe that party is acting with the best intentions, phishing email victims respond without thinking twice about it.In a phishing email, cybercriminals will typically ask for your:Date of birth Social security numbers Phone numbers Credit card details Home address Password information (or what they need to reset your password This information is then used by cybercriminals to impersonate the victim and apply for credit cards or loans, open bank accounts, and other fraudulent activity.

Question 04

Examples of requested actions in a phishing email include:

Reply to the email

Clicking an attachment

Responding to a social media connection request

Phishing happens when a victim replies to a fraudulent email that demands urgent action. Examples of requested actions in a phishing email include: Clicking an attachment Enabling macros in Word document Updating a password Responding to a social media connection request Using a new wi-fi hot spot. Every year, cybercriminals become savvier with their phishing attacks and have tried-and-tested methods to deceive and steal from innocent victims. Because phishing attacks come in many different forms, differentiating one from a valid email, voice mail, text message, or information request can be difficult.

QUESTION 05

You receive an email from your teacher. She asks for the name, telephone numbers and addresses of your family members. The email says it’s urgent and to please reply right away. You should reply right away. Right? True or False?

TrUE

ONLY if you like the teacher

FALSE

It may be a phishing attempt. Check it out first by comparing the email address with the one your teacher provided in class. If it matches, you can alsoconfirm whether the request was really from your teacher by talking to your classmates

QUESTION 06

You get a text message from a vendor who asks you to click on a link to renew your password so that you can log in to its website. You should:

Reply to the text to confirm that you really need to renew your password

Call the vendor, using a phone number you know to be correct, to confirm that the request is real

Click on the link. If it takes you to the vendor’s website, then you’ll know it’s not a scam

The best way to confirm that the request is real is to call your vendor using a number you know to be correct. Do not reply to the text itself or use a number in the text, or else you might just wind up talking to a scammer.

Question 07

If you fall for a phishing scam, what should you do to limit the damage?

Delete the phishing email

Change any compromised passwords

Unplug the computer. This will get rid of any malware

To limit the damage you should immediately change any compromised passwords and disconnect from the network any computer or device that could be infected with malware because of the phishing attack. Deleting the email will not stop any damage the attack may have caused.

Question 08

Email authentication can help protect against phishing attacks. True or False?

TRUE

FALSE

Email authentication technology helps prevent phishing emails from reaching your company’s inboxes.

Question 09

Is the image below of a real email or phishing email?

PHishing

REAL

- The email is addressed to you personally (using your complete name) - It comes from an official private email (you can check if the email is offical by researching the name of the company and comparing the email to others you might have received from them)- It does not include spelling and/or grammatical errors - The email was not sent at an odd hour - It does not include an unrealistic offer - It does not include a request for a donation

Question 10

Should you trust this email?

YES

Microscopio

NO WAY

Apple ID is not a real Apple email address.Phishing tips• Avoid strangers, check name and email address• Don’t rush, be suspicious of emails marked “urgent”• Notice mistakes in spelling and grammar• Beware of generic greetings, “dear sir/ma’am”• Don’t be lured by incredible “deals”• Hover over the link before you click to ensure it has a secureURL (https://)• Never give out personal or financial information based on anemail request• Don’t trust links or attachments in unsolicited emails

CONGRATS! well done!

Be smart, check before you reply or clic! Protect yourself against phishing!

3-4 RESPUESTAS CORRECTAS Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat.