Notice: This page requires JavaScript to function properly.
Please enable JavaScript in your browser settings or update your browser.
Phishing | Introduction to Cyber Security
course content

Course Content

Cyber Security Fundamentals

PhishingPhishing

Phishing is a cyber-attack where attackers attempt to trick individuals into divulging sensitive information, such as login credentials or financial details, by posing as trustworthy entities through deceptive emails, messages, or websites.

How to detect phishing?

  • Check the Sender's Email Address: Verify the sender's email address, especially if the email appears unexpected or requests sensitive information;
  • Inspect URLs: Hover over hyperlinks to reveal the actual URL. Be cautious if the link address seems suspicious or differs from what's expected;
  • Look for Generic Greetings: Phishing emails often use generic greetings, lacking personalized information.

Phishing protection

Phishing
protection

Strong Passwords

Email Filtering

Multi-Factor Authentication

Regular Software Updates


One notable and interesting phishing case is the "Google Docs Phishing Attack" that occurred in 2017.
Cybercriminals used a well-crafted phishing email that appeared to be a legitimate invitation to view a Google Docs document. The emails were personalized and seemed to come from someone the target knew.
The phishing attack spread rapidly due to the nature of the emails appearing to come from known contacts. Numerous individuals, organizations, and businesses fell victim to the attack.

What is the primary goal of a phishing attack?

Select the correct answer

Everything was clear?

Section 1. Chapter 4
course content

Course Content

Cyber Security Fundamentals

PhishingPhishing

Phishing is a cyber-attack where attackers attempt to trick individuals into divulging sensitive information, such as login credentials or financial details, by posing as trustworthy entities through deceptive emails, messages, or websites.

How to detect phishing?

  • Check the Sender's Email Address: Verify the sender's email address, especially if the email appears unexpected or requests sensitive information;
  • Inspect URLs: Hover over hyperlinks to reveal the actual URL. Be cautious if the link address seems suspicious or differs from what's expected;
  • Look for Generic Greetings: Phishing emails often use generic greetings, lacking personalized information.

Phishing protection

Phishing
protection

Strong Passwords

Email Filtering

Multi-Factor Authentication

Regular Software Updates


One notable and interesting phishing case is the "Google Docs Phishing Attack" that occurred in 2017.
Cybercriminals used a well-crafted phishing email that appeared to be a legitimate invitation to view a Google Docs document. The emails were personalized and seemed to come from someone the target knew.
The phishing attack spread rapidly due to the nature of the emails appearing to come from known contacts. Numerous individuals, organizations, and businesses fell victim to the attack.

What is the primary goal of a phishing attack?

Select the correct answer

Everything was clear?

Section 1. Chapter 4
some-alt