Task PDF
Task PDF
Task PDF
What is phishing?
Phishing is a type of cybercrime where criminals send fraudulent emails or text messages that appear to
be from a legitimate company or organization, such as a bank, credit card company, or social media
platform. The goal is to trick you into clicking on a malicious link or opening an attachment, which can
then steal your personal information, such as your passwords, credit card numbers, or Social Security
number.
Be suspicious of unsolicited emails and text messages, especially those that ask for personal information.
Never click on links or open attachments in emails or text messages from unknown senders.
If you're unsure whether an email or text message is legitimate, contact the company or organization
directly using a phone number or website that you know is real.
Keep your software up to date, including your operating system, web browser, and antivirus software.
Use strong passwords for all of your online accounts and enable multi-factor authentication whenever
possible.
Here are some additional tips to help you protect yourself from phishing scams:
Hover over links before you click on them. This will show you the actual URL of the link, which may be
different from the text that is displayed.
Look for red flags in emails and text messages. This includes things like poor grammar and spelling, typos
in the sender's email address or website URL, and threats of account suspension or other negative
consequences if you don't take immediate action.
Be careful about what information you share online. Avoid sharing personal information such as your
home address, phone number, and date of birth on social media or other public websites.
If you think you may have been the victim of a phishing scam, act immediately to protect your accounts
and your identity. Change your passwords and enable multi-factor authentication for all of your online
accounts. You should also contact your bank and credit card companies to let them know what
happened.
Help spread the word about phishing scams by sharing this information with your friends and family.
Together, we can help to protect everyone from these costly and dangerous attacks.
Topcic 2 Infographic: The Most Common Types of Cyber Attacks
Malware
Malware is a malicious software that can damage or disable your computer system, steal your personal
information, or spy on your activities. Malware can come in many forms, such as viruses, worms, Trojans,
ransomware, and spyware.
Phishing
Phishing is a type of social engineering attack where criminals trick you into revealing your personal
information, such as your passwords, credit card numbers, or Social Security number. Phishing attacks
typically involve fraudulent emails or text messages that appear to be from a legitimate company or
organization.
A Man-in-the-Middle (MITM) attack is a type of cyber-attack where a hacker inserts themselves in the
middle of a communication between two parties. The hacker can then eavesdrop on the communication
or even intercept and modify the data being exchanged.
A Denial-of-Service (DoS) attack is a type of cyber attack where a hacker floods a website or server with
traffic, making it unavailable to legitimate users. DoS attacks can be used to extort money from
businesses or organizations, or simply to cause disruption.
A Distributed Denial-of-Service (DDoS) attack is a type of DoS attack that uses multiple computers to
flood a website or server with traffic. DDoS attacks can be much more powerful than traditional DoS
attacks, and they can be very difficult to defend against.
SQL Injection
SQL injection is a type of cyber attack where a hacker injects malicious SQL code into a database query.
This can allow the hacker to steal data from the database or even modify the data.
Zero-Day Exploit
A zero-day exploit is a type of cyber-attack that exploits a vulnerability in a software application that the
vendor is not aware of. Zero-day exploits can be very dangerous, as there is no patch available to fix the
vulnerability.
Business Email Compromise (BEC) is a type of cyber-attack where the attacker targets a business and
impersonates a senior executive or other trusted person. The attacker then sends fraudulent emails to
the business's employees, instructing them to transfer money or reveal sensitive information.
There are a number of things you can do to protect yourself from cyber-attacks, such as:
Use strong passwords and enable multi-factor authentication for all of your online accounts.
Keep your software up to date, including your operating system, web browser, and antivirus software.
Be careful about what information you share online. Avoid sharing personal information such as your
home address, phone number, and date of birth on social media or other public websites.
Be suspicious of unsolicited emails and text messages, especially those that ask for personal information.
Never click on links or open attachments in emails or text messages from unknown senders.
If you think you may have been the victim of a cyber-attack, act immediately to protect your accounts
and your identity. Change your passwords and enable multi-factor authentication for all of your online
accounts. You should also contact your bank and credit card companies to let them know what
happened.
Example 1.
Example 2
LOGO