Types of phishing
Cybersecurity Tools
Money Scams
Phishing Red Flags
Preventing Phishing
100

What is phishing?

phishing involves an attacker sending a generic email to many people, trying to trick them into giving personal information

100

What is antivirus software?

This type of software helps detect and remove viruses and malware from your computer.

100

 What is an inheritance scam?

A scam where someone promises you a large inheritance from a distant relative or foreign royal family.

100

This type of error in an email is often a red flag that the message could be part of a phishing scam.

spelling and grammar mistakes

100

You should always do this to your computer and software to ensure they are protected from the latest threats

 keep your software updated

200

What is spear phishing?

In this specific type of phishing, the scam is directed at a particular person and includes personal details to make it more convincing.

200

What is a VPN (Virtual Private Network)?

This cybersecurity tool allows you to browse the internet securely by masking your IP address.

200

What is a refund scam?

A scam where attackers pretend to offer you a refund or prize, but ask for your credit card details to "process" it.

200

What is urgency or a sense of emergency?

This is a warning sign in phishing scams when the message puts pressure on you to act quickly, often threatening consequences.

200

If you receive a suspicious email, you should report it to this type of team or organization.

the IT department, anti-phishing authority, or cybersecurity team

300

 What is vishing (voice phishing)?

This is a phone-based phishing scam where scammers call victims pretending to be from a legitimate organization to steal personal information.

300

What is encryption software?

This tool encrypts data so it cannot be easily accessed by unauthorized users.

300

What is a job offer scam?

A scam that targets job seekers by pretending to offer employment opportunities, asking for money for training, or stealing personal details.

300

A major red flag is when the email address looks suspicious, like using extra letters or numbers. What should you check to avoid this trap?

the sender’s email domain

300

What are the top three ways to avoid phishing attacks?

  1. Don’t click on suspicious links.

  2. Verify the sender’s email address.

  3. Use cybersecurity tools like antivirus and VPNs.

400

Write the missing phrase: I received a phishing email that looked like it was from my bank, but it was actually trying to steal my 

login details

400

Investing in good cybersecurity software is essential to ............. online threats like viruses and phishing scams.

protect against

400

The online shopping website .............. a scam, and I never received the items I paid for.



turned out to be

400

give examples of Unusual payment methods

payment via unconventional methods, such as wire transfers to unknown accounts, cryptocurrency, or gift cards

400

Use strong ........... & enable two-factor .........

passwords, authentication

500

Give a definition to Breach

A violation of security where unauthorized individuals gain access to private or confidential information, often involving personal or financial data.

500

Encrypt....

 The process of converting information or data into a secure code to prevent unauthorized access. It helps protect sensitive information from being intercepted.

500

Scam....

A dishonest scheme or fraud designed to cheat someone out of money or personal information.

500

The link text in the email may look ............., but the actual URL might not match up. 

legitimate

500

Pop-ups aren’t just irritating; they are often linked to .............as part of attempted phishing attacks

malware

M
e
n
u