What is Phishing?

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the fourth risk of phishing?

Fake social media posts made in your accounts

What is the second risk of phishing?

Fraudulent charges on credit cards

What is phishing?

Is a cyber attack that try's to steal your login information or install viruses to steal your personal information

What is the third risk of phishing?

Lost access to photos, videos, and files

Finally, what is phishing?!

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source.

What can happen if you click on a phishing email link or attachment?

The email sender could gain access to company systems. The email sender could steal your personal information or company information. The email sender could distribute malware into the company network. illegal purchases or commit fraud.

What are common phishing scams?

There is many ways you can get scammed but unknown sender, sense of urgency, unexpected attachment, or too good to be true are the most common phishing scams

traditional strategies

Traditionally strategies give few visual clues in order to judge if the website is credible or not

True or False sponsored content is sources that publish articles that are sponsored and requires you to be alert and awake

True!

True or False websites use strategies to make the website look more trustworthy to trick people in giving information

True!

True or False Traditionally strategies give few visual clues in order to judge if the website is credible or not

True!

How can you detect phishing?

You can detect phishing in many ways. Emails, webpages, weird links, or try to look for misspellings because phishing try to trick you with misspellings or look-alike URLs

Vocabulary Website cleanliness

another strategy to look at a website design as a whole but some credible sources contain less visual clues.

Vocabulary!!! What is the definition of credibility

credibility is being trusted and believed

There are 5 risk to phishing. What is the first risk?

personal money being stolen from your bank account

How can a person executing a phishing attack steal someone's identity?

phishers use the information entered in the website to make illegal purchases or commit fraud.

sponsored content

sponsored content is sources that publish articles that are sponsored and requires you to be alert and awake

Website domains

website domains are like .org, .net, .edu, or .com are all website domains , but website domains like .gov or . edu are most trustworthy

Conflict of interest

when authors goals influence their ability to present fairly and honest.

What is the fifth risk of phishing

Cybercriminals impersonating you to a friend or family member, putting them at risk


Conjuntos de estudio relacionados

Cognitive Biases - Passage Analysis Exercises - LIVE Set 1

View Set

PSY 207: Chapter 15- Physical and Cognitive Development Middle Adulthood

View Set

Class 2 - Thermoregulation, Perfusion, Oxygenation, & Comfort

View Set

Blood Transfussions and Lab Values

View Set

Nutrition 251 Exam 4 Study Guide

View Set

Topic 3 Review: Challenges in the Late 1800s

View Set