DemoLearn about the human behavior element of phishing attacks.
- [Instructor] As a first example,…we will look at the I LOVE YOU worm,…which leveraged typical human behavior…to cause the worm to spread widely.…The elements of the message are From, Fellow Employee.…Subject, ILOVEYOU.…The content of the message…is kindly check the attached love letter coming from me.…And the message has an attachment called LOVELETTER.vbs.…As we look at the example of the I LOVE YOU message,…we must recognize that the message…instills a sense of curiosity…and it might be challenging to not open the message.…
This email message is actually a worm…that required a person to execute the attachment,…but is a great example of how a message might be written…or have content to persuade us to open an attachment.…Let's take a look at some phishing examples…and see which ones you would be concerned about.…First we will see a generic bank phishing scam…that may be sent out to thousands of people,…but only those that have a relationship with the bank noted…might reply and take action.…The elements of the message are From, CEO@yourBank1.com.…
Phishing is successful when an email message persuades a person to take an action or reveal information which should not be disclosed. Whaling focuses on high-profile targets such as executives, politicians, and celebrities. Learn about the tactics used in phishing and whaling, and view some examples so that you can identify suspicious emails and network intrusions. Then learn how to reduce your risk and put protections in place to help mitigate these threats.
This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- What is phishing?
- Types of phishing, including cat phishing, spear phishing, and vishing
- Phishing examples
- What is whaling?
- How to reduce phishing and whaling with technology and procedures