Search Header Logo
Users and Security threats: Part 2

Users and Security threats: Part 2

Assessment

Presentation

Computers

9th - 12th Grade

Medium

Created by

Mr. Marble

Used 5+ times

FREE Resource

5 Slides • 4 Questions

1

media

2

media

3

Multiple Select

which of the following below can be used in a Phishing attack?

1

Email

2

Phone

3

Text

4

Chatlog

5

Voice message

4

media

5

Open Ended

Check your understanding: in your own words describe Whale and spear Phishing.

6

media

7

Multiple Select

What are some key things you need to look out for when it comes to Pharming

1

HTTP VS HTTPS

2

The way the site looks

3

making sure the URL code it written right

8

media

9

Poll

Closing Question: Do you believe that it is possible for you yourself to get tricked by a phishing Attack?

Yes

No

Maybe

I don't know

media

Show answer

Auto Play

Slide 1 / 9

SLIDE