Security Management Programs and Oversight: Phishing Flashcards

1
Q

What is Phising?

A

Phishing is a cyberattack technique that involves tricking individuals or organizations into revealing sensitive information, such as login credentials, financial data, or personal information. Typically, the attacker poses as a trustworthy entity or uses deceptive tactics. Phishing attacks typically occur through common communication channels, including:

Email

Text messages

Social media

Phone calls

Social engineering

Spear Phising

Smishing

The ultimate goal of phishing is to exploit the target’s trust and manipulate them into taking actions that benefit the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Organizational phishing campaigns

A

A security awareness phishing campaign is a controlled and educational initiative conducted by organizations to raise awareness among employees, contractors, or other stakeholders about the risks and tactics associated with phishing attacks. The primary goal of such a campaign is to educate individuals on how to:

Recognize phishing attempts.

Respond appropriately.

Contribute to the overall cybersecurity posture of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing Signs?

A

Recognizing phishing attempts is crucial for individuals and organizations so they can help protect themselves from falling victim to these deceptive attacks. Phishers use a variety of tactics to make their messages appear genuine, but there are key elements and red flags that can help you identify phishing attempts, including:

Sender’s email address.

Generic greetings.

Urgent language.

Grammar (or lack thereof).

Suspicious links.

Attachments.

Requests for personal information.

Bad URLs.

Proper responses to phishing attempts are essential to mitigate the risks associated with these deceptive attacks. When employees or individuals encounter phishing attempts, it’s crucial to take immediate action to protect sensitive information, prevent potential breaches, and report the incident to the appropriate authorities.

Report

Isolate

Create Email filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly