Phishing/Pharming

Phishing involves deceptive emails and fake websites to steal personal data, while pharming exploits servers or computers with malicious software to redirect users to fraudulent sites. Pharming is more sophisticated and can infect entire networks, posing a significant security threat. Unlike phishing, pharming attacks can occur without user interaction, making them harder to detect.


The key objectives of this section are to :

  1. Increase awareness among participants about the risks of phishing and pharming attacks, highlighting the potential consequences of falling victim to such scams.
  2. Equip participants with strategies and tools to identify phishing emails, fake websites, and suspicious online activities, enabling them to recognize and avoid potential threats.
  3. Foster a culture of cybersecurity vigilance and proactive risk mitigation, encouraging participants to report suspicious incidents and adhere to best practices for online security and data protection.

Competencies you are developing:

  1. Cybersecurity Awareness: Enhancing your understanding of common online threats, including phishing and pharming attacks, and your ability to recognize signs of suspicious activity.
  2. Digital Literacy: Building your competencies in navigating online environments safely and responsibly, discerning between legitimate and fraudulent websites, and understanding the risks associated with sharing personal information online.
  3. Critical Thinking: Developing your capacity to critically evaluate online content, including emails and websites, to identify potential scams and protect against cyber threats.

Think for a moment...
  1. Can you recall a specific instance where you received a suspicious email or message prompting you to click on a link or provide personal information? How did you handle the situation?
  2. Have you ever encountered a phishing website or fraudulent online platform that attempted to mimic a legitimate service or organization? How did you identify it as a potential threat?

  3. Could you describe any precautions or security measures you take to avoid falling victim to phishing or pharming attacks when browsing online or interacting with emails?

  4. Have you or anyone you know ever experienced identity theft or financial loss as a result of a phishing or pharming attack? How did you or they address the situation and mitigate the impact?




Posledná zmena: Utorok, 25 jún 2024, 12:44