Phishing Basics
Types of Phishing
Prevention Tactics
Real-World Scenarios
100

What is Phishing?

A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data

100

What is Spear Phishing?

A more targeted form of phishing, where attackers research their victims to create a more personalized and convincing lure.

100

Name one method to verify the authenticity of an email.

Check the sender's email address for discrepancies, look for poor spelling and grammar, or contact the company directly using information from their official website

100

You receive an email from your CEO asking for a wire transfer to a new vendor, what should you do?

Verify the request through a secondary communication channel, like a phone call, especially if the request is unusual or urgent.

200

What common tactic do phishing emails use to create a sense of urgency?

They often use alarming language and claim that immediate action is required to avoid negative consequences.

200

What is Vishing?

It's voice phishing, where fraudsters use phone calls to scam the victim.

200

What is the first step you should take if you suspect an email is phishing?

Do not click on any links or attachments and report the email to your IT department.

200

Your friend sends you a link to a site offering a free phone. What should you do?

Be skeptical and verify the offer by checking official sources or contacting your friend through another method to confirm they sent it.

300

What is a common sign of a phishing email?

Misspelled domain names or the use of subdomains that mimic legitimate websites.

300

What is Whaling?

A type of phishing targeted at high-profile individuals like CEOs, CFOs, etc.

300

What tool can help identify phishing emails?

Email security software that filters out suspicious messages.

300

You receive an email from your bank asking for your account details. What's your next step?

Contact your bank using official channels to verify the request.

400

Why is it important to keep software and systems updated in the context of phishing?

Updates often include security patches that protect against vulnerabilities that phishers may exploit.

400

What is Clone Phishing?

 It involves creating a nearly identical replica of a legitimate message that has been previously sent, with malicious links or attachments.

400

What personal habit can reduce the risk of falling for phishing scams?

Setting complex passwords and using multi-factor authentication.

400

An email claims you have a package waiting but requires personal information to release it. How do you proceed?

Verify the sender by checking tracking numbers on the official courier website or contacting them directly.