Cyber Security

Cyber Security

More Options: Make a Folding Card

Storyboard Description

This storyboard does not have a description.

Storyboard Text

  • Phishing occurs when scammers attempt to electronically acquire sensitive information by pretending to be a trustworthy entity. Let's look at scenario 1. Janelle has just received an email from a scammer.
  • You can combat phishing by avoiding suspicious websites, verifying websites' security, ignoring emails from unknown addresses, using firewalls, checking online accounts regularly, using antivirus software, and never giving out personal information online. Now, let's look at scenario 2. Janelle has still received a mysterious email from a scammer, but her response is very different!
  • Scammers can use emails or texts in order to accomplish their goal: getting you to share your sensitive information.
  • Hmmmm... I've never seen this email before. Or the website link attached.
  • Yes! She is falling for my scam! MWAHAHAHAHA!
  • They're asking for a lot of personal information. I don't think I should click on this link, as it could be spam. Luckily, I have antivirus software and firewalls, and I've learned how to recognize and avoid spam.
  • Examples of information they try to get from you are usernames, passwords, credit card details, and Social Security information
  • Its from a Target manager who wants my credit card information and phone number in return for a $1000 Target gift card. Sweet!
  • Hmmm... I've never seen this email or website before. It looks pretty sketchy.
  • No! She didn't fall for my phishing attack!
Explore Our Articles and Examples

Try Our Other Websites!

Photos for Class   •   Quick Rubric   •   abcBABYart   •   Storyboard That's TPT Store