Show Menu
Cheatography

Awareness Module 1 Cheat Sheet (DRAFT) by

This cheat sheet summarizes the key concepts from Module 1 to help with quiz preparation.

This is a draft cheat sheet. It is a work in progress and is not finished yet.

Phishing

An attack where a hacker impers­onates a trusted entity to steal inform­ation, spread malware, or deceive victims.

Types of phising

Email
Create urgency to trick victims into giving inform­ation, logging in, or sending money.
Vishing (via phone)
Phone scam where attackers impers­onate trusted entities to steal inform­ation.
Smishing (via text)
Text scam impers­onating a trusted entity to steal data or money.

Red Flags to look for on phishing attacks

Sender Email Address
Look for misspe­llings, slight changes, or unknown senders.
Urgent or Fearful Language
Beware of urgent phrases like “immediate action” or “account suspen­ded.”
Suspicious Links & Attach­ments
Hover over links and check file extensions to spot threats.
Poor Grammar & Spelling
Typos and errors can signal phishing; legit firms are proofread.
Requests for Person­al/­Fin­ancial Info
Beware of unexpected emails requesting sensitive info.
Unusual Content
Watch for generic greetings, odd content, or unusual tone.
 

Measures to face phishing / spam attacks

1. Report phishing emails­/ca­lls­/texts to the IT department or superv­isor.
2. Provide cybers­ecurity training for employees.
3. Verify the legitimacy of the sender's email/­text.
4. Verify contact inform­ation from official websites before continuing with phone calls.

Elements of Phishing attacks

Impers­onation
Appears legit with official logos, format­ting, and language.
Persuasive Language
Uses emotions, threats, or rewards to prompt action.
Sense of Urgency
Pressures victims with urgent security threats or account issues.
Malicious Links
Sends victims to fake sites or numbers to steal data.
Dangerous Attach­ments
May hide malware in fake invoices or receipts.

Spam Emails

Spam emails steal data, harvest addresses, or spread malware.

Examples
1. Promotions (fake discounts, giveaways)
2. Job Scams (fraud­ulent employment offers)
3. Lottery Scams (fake winnings, prize claims)
4.Phishing Attempts (deceptive messages to steal inform­ation)

Key Charac­ter­istics
I. Unsoli­cited & unwanted (a.k.a. junk email)
II.Mas­s-d­ist­ributed to many recipients
III.Can be part of phishing campaigns
IV.Often linked to advert­ising or fraud