Recognizing phishing

Recognizing phishing

MODULE CONTENTS

This module explains the principle of phishing. The different types of attacks are explained. Some techniques to identify them are reviewed. This module consists of a 3-minute motion design followed by a quiz to validate the learners' skills.

PEDAGOGICAL OBJECTIVES

  • Know the principle of phishing

  • Become familiar with the different techniques used by hackers

  • Give some examples of attacks

In the phishing technique, a hacker will try to organize a mass attack and send an email to many messengers in the hope of extracting information and obtaining gains.

It is imperative to be wary of all messages asking you to click on a link or open an attached file. In most cases, you receive an email from a trusted site, such as a bank for example. You are prompted to click on a link and are then directed to a perfect copy of the trusted site. You are then prompted to enter your username and password: the aim is to retrieve your information and impersonate you on the site in question.

There are ways to identify this type of attack:

To sum up, be careful of abnormal requests.

Phishing has developed considerably in recent years and the level of quality of attacks is constantly increasing, so caution is an essential rule to avoid these attacks.