Phishing Scams

Descrição

A mind map on how to identify phishing and how to deal with emails you think might be a scam.
Lucy Corlett
Mapa Mental por Lucy Corlett, atualizado more than 1 year ago
Lucy Corlett
Criado por Lucy Corlett aproximadamente 5 anos atrás
233
0

Resumo de Recurso

Phishing Scams
  1. Phishing
    1. How to identify phishing
      1. Impersonalised greeting
        1. The phishers won't know your real name!
        2. Bad grammar
          1. The phishers often won't bother to proofread their work, so look out for spelling and grammar mistakes
          2. Variation on genuine address
            1. They won't use their personal email address, so usually they will alter a real one.
            2. False link
              1. If there is a link included in the email, roll your mouse over it to check it leads to where it says it does
              2. Personal information
                1. Phishers will often ask for information such as bank details or date of birth
                2. Urgency
                  1. Often there will be a deadline for the information requested. e.g. "If you do not submit your account details by midnight tomorrow, your account will be closed and you will lose any money saved in it."
                3. How to deal with a phishing email
                  1. Ring up the person they're pretending to be to check if the email is real
                    1. You never know, it might be a genuine email
                    2. Save a copy of the email
                      1. This can be used as evidence if you tell anybody
                      2. Report it as phishing
                        1. You can do this by clicking on the report button or reporting it on an online website

                    Semelhante

                    A level Computing Quiz
                    Zacchaeus Snape
                    Types and Components of Computer Systems
                    Jess Peason
                    Input Devices
                    Jess Peason
                    Output Devices
                    Jess Peason
                    Computing
                    Kwame Oteng-Adusei
                    Pack of playing cards answer
                    Karl Taylor
                    Code Challenge Flow Chart
                    Charlotte Hilton
                    Passwords & Security
                    Lucy Corlett
                    System Threats
                    Ella Fisher Scott
                    Computing Hardware - CPU and Memory
                    ollietablet123
                    Computer Systems
                    lisawinkler10