1/6
These flashcards cover key concepts related to cybersecurity threats, particularly phishing and smishing, and provide guidance on recognizing and preventing them.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Vestibule
A set of 2 doors that only allows one person to enter at a time, often requiring proper credentials.
Credentials
Forms of identification used to grant access, such as ID cards, biometrics, or PIN typing.
Phishing
An attack where users are tricked into giving away private information through seemingly legitimate communication.
Smishing
Phishing attacks conducted via SMS text messaging.
Counterfeit site
A website that mimics a legitimate site, often set up to steal user credentials.
Golden rule of email
Always verify the legitimacy of an email by checking the website directly rather than through links in the email.
Hints for identifying fake emails
Look for generic greetings, spelling or grammar mistakes, and urgent calls for immediate action.