
Phishing Attacks
Presentation
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Easy
Maria Cruz Farooqi
Used 8+ times
FREE Resource
2 Slides • 13 Questions
1
Phishing Attacks
Learning Target: I can describe the risks to privacy from collecting and storing personal data on a computer system
2
Dropdown
But there's a weakest link: the
A phishing attack is an attempt to
3
4
Dropdown
A phishing attack typically
5
Dropdown
6
Dropdown
7
Dropdown
Fortunately, there are some
Suspicious email address
Phishing emails will often come from addresses at
Conversely, a legitimate email address is not a
8
Dropdown
Phishing emails will often link to a website with a URL that looks
9
Dropdown
A spelling that uses similar looking characters from other alphabets. For example, "wikipediа.org" versus "wikipedia.org". The "e" and the "a" are actually different
Subdomains that look like the domain name. For example, "paypal.accounts.com" instead of "accounts.paypal.com". PayPal owns the second domain, but they have no
A different top level domain (TLD). For example, "paypal.io" versus "paypal.com". Popular companies try to buy their domain with the most common TLDs, such as ".net", ".com", and ".org", but there are
10
Dropdown
Any
11
Dropdown
12
Dropdown
Phishing emails use
13
Multiple Choice
Nisa receives this security alert about her Google account:
She suspects that it's a phishing email, so she decides not to click the buttons at the bottom.
Which aspect of the email is least indicative of a phishing attack?
The email includes a company logo.
The email recommends clicking buttons to take further action.
The sending email address is not from a google.com domain.
The subject line uses warning signs and an exclamation mark.
The email uses non-standard spacing and capitalization.
14
Multiple Choice
Evelyn receives an email that claims to be from the IRS, the United States Internal Revenue Service. The email states that their tax refund is ready and includes an attachment labeled "taxrefund.doc".
Evelyn is eager for their refund but worried the email is a phishing scam.
What is the safest next step?
Evelyn can download the attachment, send it through their antivirus software, and confirm that it has no malware inside it. Then they can safely open it.
Evelyn can open the attachment from their mobile phone instead of from their personal computer, since the mobile phone is more malware-proof.
Evelyn can find the official IRS website by searching the Web and contact IRS through a listed email address to inquire about the email.
Evelyn can search the Web to see if the ".doc" file type can ever contain malware. If it is always safe, then they can open it.
15
Multiple Select
Agatha received an email from her bank that asked for verification of her account details. She clicked the link in the email and entered her username and password into a form.
At that point, she realized the email was a phishing scam, and she had just revealed her password to the cyber criminals behind the scam.
What are the effects of revealing her bank account password to cyber criminals?
👁️Note that there are 2 answers to this question.
They can try the password on other websites where she has a login.
They can log into her computer and look at the files on her hard drive.
They can now more easily figure out other people's passwords for the banking site.
They can use the password to login to the real bank website.
They can use the password to access the entire database of the banking website.
Phishing Attacks
Learning Target: I can describe the risks to privacy from collecting and storing personal data on a computer system
Show answer
Auto Play
Slide 1 / 15
SLIDE
Similar Resources on Wayground
9 questions
Spanish Demonstrative Adjectives
Presentation
•
9th - 12th Grade
10 questions
Absolute Value Equations
Presentation
•
9th - 12th Grade
11 questions
Quadrilaterals
Presentation
•
9th - 12th Grade
11 questions
Factoring: Quadratic Trinomial when a=1
Presentation
•
9th - 12th Grade
12 questions
Medical Math- Military Time
Presentation
•
9th - 12th Grade
12 questions
3A Gramática : -ER and -IR regular verbs
Presentation
•
KG - 12th Grade
12 questions
Resumes Pre-knowledge
Presentation
•
9th - 12th Grade
12 questions
Writing Linear Equations From Two Points
Presentation
•
9th - 12th Grade
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade
Discover more resources for Computers
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
10 questions
Fire Prevention
Quiz
•
9th - 12th Grade
24 questions
BIOLOGY STAAR REVIEW
Quiz
•
9th Grade
50 questions
STAAR English 2 Review
Quiz
•
10th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
20 questions
Figurative Language Review
Quiz
•
10th Grade
30 questions
English 1 STAAR Review
Quiz
•
9th Grade