Identify the common types of phishing attacks.
- [Instructor] The threats of phishing can be numerous…and depends on what information is disclosed…or actions taken by a person.…That could simply be the loss of your identity…or as bad as providing hackers access to your systems.…Depending on the access provided…and to which resources a phishing attack leads to,…the attack may compromise the integrity…and availability of your systems.…Overall, attackers are typically looking…for financial gain from their efforts.…There are many different types of phishing…which we will review.…
We will explore basic phishing, cat phishing,…spear phishing, whaling, and vishing.…Each of these attacks target a different group…and use different tactics.…Phishing is the attempt to get personal information…from a person.…The term Spray and Pray is commonly used…in regards to phishing.…An attacker will send, or some call it spray,…an email to every email address they have.…The message will look like it is from a bank…and the attacker prays some people respond.…
Only so many of those receiving the email will even use…
Phishing is successful when an email message persuades a person to take an action or reveal information which should not be disclosed. Whaling focuses on high-profile targets such as executives, politicians, and celebrities. Learn about the tactics used in phishing and whaling, and view some examples so that you can identify suspicious emails and network intrusions. Then learn how to reduce your risk and put protections in place to help mitigate these threats.
This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- What is phishing?
- Types of phishing, including cat phishing, spear phishing, and vishing
- Phishing examples
- What is whaling?
- How to reduce phishing and whaling with technology and procedures