Understanding how human behaviour is exploited to compromise security.
Before we look at software and human threats, let's recap the physical hardware that makes up a network. Open your Google Doc and answer True or False to the following.
To understand how human behaviour is exploited through social engineering to compromise network security.
Manipulating people so they give up confidential information. People are often the 'weak point' in a secure network.
Why break the lock when you can trick someone into handing you the key?
Sending fraudulent emails or messages containing malicious links that direct users to fake websites to harvest credentials.
From: security@paypa1-alert.com
URGENT: Your account is locked!
Click here to reset password
Malicious code that automatically redirects a user to a fake, fraudulent website, even if the correct URL was typed.
Physically observing a person entering sensitive data, such as watching them type their password or ATM PIN.
Even if an organisation installs million-pound firewalls and complex encryption, a network is only as secure as the people using it. This is why hackers rely on Social Engineering.
Phishing emails are designed to cause panic or curiosity. Here is how you spot them:
From: Support@PayPa1.com
Subject: URGENT: Your account will be closed in 24 hours
Dear Customer,
We have detected unauthorised activity on your account. You must click the link below to verify your identity immediately, or your funds will be frozen.
Verify Account NowHover over the highlighted sections above to see why this is a scam.
Phishing_Simulator.html link shared in Google Classroom.In your Google Doc, answer the following 6-mark OCR exam question in full sentences.
To finish the lesson, complete the final exit ticket on Google Classroom to demonstrate you have met today's learning objective.
Task: Answer the exit question: "Explain the difference between Phishing and Pharming."
Open Exit Ticket in Google Forms