Show Menu
Cheatography

Awareness Module 1 Cheat Sheet (DRAFT) by

This cheat sheet summarizes the key concepts from Module 1 to help with quiz preparation.

This is a draft cheat sheet. It is a work in progress and is not finished yet.

Phishing

Phishing: A cyber attack where an attacker impers­onates a legitimate entity to deceive the victim into revealing sensitive inform­ation, clicking malicious links, or commun­icating with unverified phone numbers.

Types of phising

Email
Often create urgency, pressuring victims to take action such as providing sensitive inform­ation, logging into fake websites, or transf­erring money/­cry­pto­cur­rency.
Vishing (via phone)
A phone-­based scam where an attacker impers­onates a trusted entity to manipulate the victim into compro­mising personal or organi­zat­ional assets.
Vishing (via text)
A text-based scam where an attacker impers­onates a trusted entity to trick the victim into revealing sensitive inform­ation or transf­erring funds.

Red Flags to look for on phishing attacks

Sender Email Address
Check for slight variat­ions, misspe­llings, or unfamiliar senders impers­onating trusted sources.
Urgent or Fearful Language
Watch for phrases like "­urg­ent­," "­imm­ediate action requir­ed,­" or "­account suspen­ded­" meant to pressure you into acting quickly.
Suspicious Links & Attach­ments
Hover over links before clicking and verify file extensions to avoid malware or fake websites.
Poor Grammar & Spelling
Legitimate organi­zations proofread emails­—errors can signal phishing attempts.
Requests for Person­al/­Fin­ancial Info
Be wary of unexpected emails asking for login creden­tials, banking details, or sensitive data.
Unusual Content
Look out for generic greetings, irrelevant content, or messages that don’t match the sender’s usual tone.
 

Elements of Phishing attacks

Impers­onation
Appears to come from a trusted source, using official logos, format­ting, and language to deceive victims.
Example: Fake PayPal email requesting account verifi­cation.
Persuasive Language
Uses emotional appeals, threats, or financial incentives to encourage action.
Example:You've won $500! Claim now!
Sense of Urgency
Pressures victims to act quickly, often claiming stolen passwords, locked accounts, or security threats.
Example:Your bank account is locked! Log in now!
Malicious Links
Directs victims to fake websites or fraudulent contact numbers to steal sensitive inform­ation.
Example:Reset your Microsoft password here.
Dangerous Attach­ments
May contain malware disguised as invoices or receipts, creating security vulner­abi­lities.
Example: Fake invoice email with a malicious PDF.

Spam Emails

Purpose:
Spam emails are used to harvest emails, steal sensitive data, or trick users into clicking malicious links or attach­ments.

Common Forms:

Promotions (fake discounts, giveaways)
Job Scams (fraud­ulent employment offers)
Lottery Scams (fake winnings, prize claims)
Phishing Attempts (deceptive messages to steal info)

Key Charac­ter­istics:
✅ Unsoli­cited & unwanted (a.k.a. junk email)
✅ Mass-d­ist­ributed to many recipients
✅ Can be part of phishing campaigns
✅ Often linked to advert­ising or fraud
✅ Carries potential security risks

Measures of action:
🚫 Don’t click links or download attach­ments
🚫 Avoid responding to suspicious emails
🔍 Verify senders before taking action
🛑 Use spam filters and report phishing attempts