What is phishing?
phishing involves an attacker sending a generic email to many people, trying to trick them into giving personal information
What is antivirus software?
This type of software helps detect and remove viruses and malware from your computer.
What is an inheritance scam?
A scam where someone promises you a large inheritance from a distant relative or foreign royal family.
This type of error in an email is often a red flag that the message could be part of a phishing scam.
spelling and grammar mistakes
You should always do this to your computer and software to ensure they are protected from the latest threats
keep your software updated
What is spear phishing?
In this specific type of phishing, the scam is directed at a particular person and includes personal details to make it more convincing.
What is a VPN (Virtual Private Network)?
This cybersecurity tool allows you to browse the internet securely by masking your IP address.
What is a refund scam?
A scam where attackers pretend to offer you a refund or prize, but ask for your credit card details to "process" it.
What is urgency or a sense of emergency?
This is a warning sign in phishing scams when the message puts pressure on you to act quickly, often threatening consequences.
If you receive a suspicious email, you should report it to this type of team or organization.
the IT department, anti-phishing authority, or cybersecurity team
What is vishing (voice phishing)?
This is a phone-based phishing scam where scammers call victims pretending to be from a legitimate organization to steal personal information.
What is encryption software?
This tool encrypts data so it cannot be easily accessed by unauthorized users.
What is a job offer scam?
A scam that targets job seekers by pretending to offer employment opportunities, asking for money for training, or stealing personal details.
A major red flag is when the email address looks suspicious, like using extra letters or numbers. What should you check to avoid this trap?
the sender’s email domain
What are the top three ways to avoid phishing attacks?
Don’t click on suspicious links.
Verify the sender’s email address.
Use cybersecurity tools like antivirus and VPNs.
Write the missing phrase: I received a phishing email that looked like it was from my bank, but it was actually trying to steal my
login details
Investing in good cybersecurity software is essential to ............. online threats like viruses and phishing scams.
protect against
The online shopping website .............. a scam, and I never received the items I paid for.
turned out to be
give examples of Unusual payment methods
payment via unconventional methods, such as wire transfers to unknown accounts, cryptocurrency, or gift cards
Use strong ........... & enable two-factor .........
passwords, authentication
Give a definition to Breach
A violation of security where unauthorized individuals gain access to private or confidential information, often involving personal or financial data.
Encrypt....
The process of converting information or data into a secure code to prevent unauthorized access. It helps protect sensitive information from being intercepted.
Scam....
A dishonest scheme or fraud designed to cheat someone out of money or personal information.
The link text in the email may look ............., but the actual URL might not match up.
legitimate
Pop-ups aren’t just irritating; they are often linked to .............as part of attempted phishing attacks
malware