

Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Signs of a phishing scam may include generic greetings, urgent action requests you did not initiate, requests for personal information, and even baseless ...
Typology: Study notes
1 / 2
This page cannot be seen from the preview
Don't miss anything!
A spear phishing attack is an attempt to acquire sensitive information or access to a computer system by sending counterfeit messages that appear to be legitimate. “Spear phishing” is a type of phishing campaign that targets a specific person or group and often will include information known to be of interest to the target, such as current events or financial documents. Like other social engineering attacks, spear phishing takes advantage of our most basic human traits, such as a desire to be helpful, provide a positive response to those in authority, a desire to respond positively to someone who shares similar tastes or views, or simple curiosity about contemporary news and events. These messages are delivered via e-mail and are designed to convince the user to open a malicious link or attachment, exposing the target to malicious software. The goal of spear phishing is to acquire sensitive information such as usernames, passwords, and other personal information. When a link in a phishing e-mail is opened, it may open a malicious site, which could download unwanted information onto a user’s computer. When the user opens an attachment, malicious software may run which could compromise the security posture of the host. Once a connection is established, the attacker is able to initiate actions that could compromise the integrity of your computer, the network it resides on, and data.
OnGuardOnline.gov Operated by the Federal Trade Commission (FTC), this site provides tips and technical guidance on cybersecurity issues as well as a guide for talking to children about Internet use. StaySafeOnline.org Offers resources on a variety of cybersecurity issues, including information on adjusting privacy settings on a number of popular platforms. Today, phishing scams are more sophisticated—identities are masked, messages are tailored, and email content appears legitimate. Signs of a phishing scam may include generic greetings, urgent action requests you did not initiate, requests for personal information, and even baseless threats. Other cyber-attack concerns include compromised or counterfeit websites that introduce malware to obtain a user’s Personally Identifiable Information (PII). Skilled hackers can create new websites that appear legitimate or hack into a legitimate site undetected and embed malicious code. Signs of a malicious website include strange or unexpected search engine results and abnormal redirects to unexpected websites. Anti-virus software tools can often catch website redirects and most search engine companies such as Google, Chrome, and Bing alert users to problematic websites and often block access to those with malware.