email scam Flashcards
What is cybercrime?
Crime committed using a computer or a network.
Which statement about cybercrime is TRUE?
- It makes more money for criminals than illegal drug trafficking.
- Someone’s identity is stolen every 10 minutes as a result of cybercrime.
- An unprotected PC can become infected within four minutes of connecting to the Internet.
1 and 3 are TRUE; 2 is FALSE.
What are four common types of email scams?
- Phishing
- Trojan Horse / Malware
- Fraudulent requests for money or advance fees
- Virus-generated email
What is phishing?
An email that tricks you into handing over sensitive or personal information.
What is a key indicator of a phishing email?
The greeting is not personalised.
True or False: Genuine organisations request personal information via email.
FALSE.
What does a Trojan Horse email typically offer?
Something tempting to look at, like an attachment or link.
What might a virus do once installed on a computer?
- Record keystrokes and send them to the attacker
- Provide access to files
- Use the computer to send spam
What is advanced fee fraud?
A scam where the sender claims to need cash in return for sending millions.
What is a common feature of virus-generated emails?
They appear to be sent from a friend whose email has been infected.
Fill in the blank: To protect yourself against email scams, use a _______.
[SPAM filter]
What should you do if you are not completely certain an email is genuine?
NEVER click any links or download attachments.
What is the purpose of a SPAM filter?
To prevent common scams from reaching your inbox.
List three ways to prevent being a victim of phishing.
- Use SPAM filters
- Be suspicious of unsolicited emails
- Never click links or download attachments from unknown sources
Who stated that carrying a mobile phone is like carrying a mobile computer?
Chris Greany, former City of London Police Commander.
True or False: A successful phishing campaign has around a 5% response rate.
TRUE.
What is a typical phishing email designed to do?
Trick you into visiting a bogus website to enter personal details.
What is a common characteristic of a phishing link?
It may look genuine but doesn’t link to the stated website.
What can happen if you click a link in a Trojan Horse email?
It can install a virus on your computer.
How often is someone’s identity stolen due to cybercrime?
Every 2 seconds.
What should you look for in an email to identify a scam?
- Poor spelling and grammar
- Sense of urgency
- Forged sender’s address
What is the purpose of an email scam?
To deceive individuals into providing sensitive information or money.