This storyboard does not have a description.
Phishing occurs when scammers attempt to electronically acquire sensitive information by pretending to be a trustworthy entity. Let's look at scenario 1. Janelle has just received an email from a scammer.
You can combat phishing by avoiding suspicious websites, verifying websites' security, ignoring emails from unknown addresses, using firewalls, checking online accounts regularly, using antivirus software, and never giving out personal information online. Now, let's look at scenario 2. Janelle has still received a mysterious email from a scammer, but her response is very different!
Scammers can use emails or texts in order to accomplish their goal: getting you to share your sensitive information.
Hmmmm... I've never seen this email before. Or the website link attached.
Yes! She is falling for my scam! MWAHAHAHAHA!
They're asking for a lot of personal information. I don't think I should click on this link, as it could be spam. Luckily, I have antivirus software and firewalls, and I've learned how to recognize and avoid spam.
Examples of information they try to get from you are usernames, passwords, credit card details, and Social Security information
Its from a Target manager who wants my credit card information and phone number in return for a $1000 Target gift card. Sweet!
Hmmm... I've never seen this email or website before. It looks pretty sketchy.
No! She didn't fall for my phishing attack!
Explore Our Articles and Examples
Try Our Other Websites!
Photos for Class
– Search for School-Safe, Creative Commons Photos (It Even Cites for You!
– Easily Make and Share Great-Looking Rubrics
– Create Custom Nursery Art