Cheatography
https://cheatography.com
This cheat sheet summarizes the key concepts from Module 1 to help with quiz preparation.
This is a draft cheat sheet. It is a work in progress and is not finished yet.
Phishing
An attack where a hacker impersonates a trusted entity to steal information, spread malware, or deceive victims. |
Types of phising
Email |
Create urgency to trick victims into giving information, logging in, or sending money. |
Vishing (via phone) |
Phone scam where attackers impersonate trusted entities to steal information. |
Smishing (via text) |
Text scam impersonating a trusted entity to steal data or money. |
Red Flags to look for on phishing attacks
Sender Email Address |
Look for misspellings, slight changes, or unknown senders. |
Urgent or Fearful Language |
Beware of urgent phrases like “immediate action” or “account suspended.” |
Suspicious Links & Attachments |
Hover over links and check file extensions to spot threats. |
Poor Grammar & Spelling |
Typos and errors can signal phishing; legit firms are proofread. |
Requests for Personal/Financial Info |
Beware of unexpected emails requesting sensitive info. |
Unusual Content |
Watch for generic greetings, odd content, or unusual tone. |
|
|
Measures to face phishing / spam attacks
1. Report phishing emails/calls/texts to the IT department or supervisor.
2. Provide cybersecurity training for employees.
3. Verify the legitimacy of the sender's email/text.
4. Verify contact information from official websites before continuing with phone calls. |
Elements of Phishing attacks
Impersonation |
Appears legit with official logos, formatting, and language. |
Persuasive Language |
Uses emotions, threats, or rewards to prompt action. |
Sense of Urgency |
Pressures victims with urgent security threats or account issues. |
Malicious Links |
Sends victims to fake sites or numbers to steal data. |
Dangerous Attachments |
May hide malware in fake invoices or receipts. |
Spam Emails
Spam emails steal data, harvest addresses, or spread malware.
Examples
1. Promotions (fake discounts, giveaways)
2. Job Scams (fraudulent employment offers)
3. Lottery Scams (fake winnings, prize claims)
4.Phishing Attempts (deceptive messages to steal information)
Key Characteristics
I. Unsolicited & unwanted (a.k.a. junk email)
II.Mass-distributed to many recipients
III.Can be part of phishing campaigns
IV.Often linked to advertising or fraud |
|