<div class="xblock xblock-public_view xblock-public_view-vertical" data-course-id="course-v1:Totem+TP_PM_001+course" data-init="VerticalStudentView" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="vertical" data-usage-id="block-v1:Totem+TP_PM_001+course+type@vertical+block@b95a134cd2d343a6b9394388b8119603" data-request-token="772dca3afb4411ecbdea0242ac12000a" data-graded="True" data-has-score="False">
<div class="vert-mod">
<div class="vert vert-0" data-id="block-v1:Totem+TP_PM_001+course+type@html+block@6c80668029714cccb15c1b45b4dae5f6">
<div class="xblock xblock-public_view xblock-public_view-html xmodule_display xmodule_HtmlBlock" data-course-id="course-v1:Totem+TP_PM_001+course" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:Totem+TP_PM_001+course+type@html+block@6c80668029714cccb15c1b45b4dae5f6" data-request-token="772dca3afb4411ecbdea0242ac12000a" data-graded="True" data-has-score="False">
<script type="json/xblock-args" class="xblock-json-init-args">
{"xmodule-type": "HTMLModule"}
</script>
<p><strong><img src="/assets/courseware/v1/ecb825ea1982454fbf9c2bb60242bd10/asset-v1:Totem+TP_PM_001+course+type@asset+block/190325_phishing-02.png" alt="Phishing Fishing" type="saveimage" target="[object Object]" width="35%" hspace="20" align="left" />Phishing is essentially an online scam.</strong> It starts with some kind of communication - an email, a tweet, a Whatsapp message, or an SMS - that is designed to look like it comes from a trusted source.<br /><br />The word "phishing" refers to "fishing", due to the similarity of using a bait in an attempt to catch a victim.<br /><br /><strong>The aim is always to trick you into <em>doing</em> something</strong> - usually clicking on a link or opening an attachment. This link might then lead you to a fake webpage that is designed to get you to <strong>enter your login details for a particular service</strong> - which could then be used to gain control over your online accounts, impersonate you (identity fraud), or sell it on to others. <br /><br />Sometimes the goal is to get you to <strong>download a virus</strong> - in this case, clicking on the link might be all it takes. <br /><br />Learning to identify an email or message as phishing before clicking on the link or downloading the file is an important step in protecting yourself. Have a look at the following examples of phishing attacks, and think about your own email inbox. <strong>Have you ever received something similar?</strong></p>
</div>
</div>
</div>
<script type="text/javascript">
(function (require) {
require(['/static/js/dateutil_factory.be68acdff619.js?raw'], function () {
require(['js/dateutil_factory'], function (DateUtilFactory) {
DateUtilFactory.transform('.localized-datetime');
});
});
}).call(this, require || RequireJS.require);
</script>
<script>
function emit_event(message) {
parent.postMessage(message, '*');
}
</script>
</div>
<div class="xblock xblock-public_view xblock-public_view-vertical" data-course-id="course-v1:Totem+TP_PM_001+course" data-init="VerticalStudentView" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="vertical" data-usage-id="block-v1:Totem+TP_PM_001+course+type@vertical+block@a3c040536515474ca411f6a4675bc095" data-request-token="772dca3afb4411ecbdea0242ac12000a" data-graded="True" data-has-score="False">
<div class="vert-mod">
<div class="vert vert-0" data-id="block-v1:Totem+TP_PM_001+course+type@html+block@3fca70deb2324a30ba712d5277b02b8d">
<div class="xblock xblock-public_view xblock-public_view-html xmodule_display xmodule_HtmlBlock" data-course-id="course-v1:Totem+TP_PM_001+course" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:Totem+TP_PM_001+course+type@html+block@3fca70deb2324a30ba712d5277b02b8d" data-request-token="772dca3afb4411ecbdea0242ac12000a" data-graded="True" data-has-score="False">
<script type="json/xblock-args" class="xblock-json-init-args">
{"xmodule-type": "HTMLModule"}
</script>
<p><strong>A phishing attack is typically carried out via a link in an email</strong> pretending to be from your bank, or from an online service like Google, Facebook or Dropbox. Some fake emails are easy to spot, but others can look very real. Below is an example.</p>
<p><img src="/assets/courseware/v1/ae118d7870fd861f9906851c2561845d/asset-v1:Totem+TP_PM_001+course+type@asset+block/Phishing_original.gif" alt="Phishing Email" type="saveimage" target="[object Object]" preventdefault="function(){r.isDefaultPrevented=n}" stoppropagation="function(){r.isPropagationStopped=n}" stopimmediatepropagation="function(){r.isImmediatePropagationStopped=n}" isdefaultprevented="function t(){return!1}" ispropagationstopped="function t(){return!1}" isimmediatepropagationstopped="function t(){return!1}" width="100%" /></p>
</div>
</div>
</div>
<script type="text/javascript">
(function (require) {
require(['/static/js/dateutil_factory.be68acdff619.js?raw'], function () {
require(['js/dateutil_factory'], function (DateUtilFactory) {
DateUtilFactory.transform('.localized-datetime');
});
});
}).call(this, require || RequireJS.require);
</script>
<script>
function emit_event(message) {
parent.postMessage(message, '*');
}
</script>
</div>
<div class="xblock xblock-public_view xblock-public_view-vertical" data-course-id="course-v1:Totem+TP_PM_001+course" data-init="VerticalStudentView" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="vertical" data-usage-id="block-v1:Totem+TP_PM_001+course+type@vertical+block@9dbfb79ed4da40ddb8004afc5f089e21" data-request-token="772dca3afb4411ecbdea0242ac12000a" data-graded="True" data-has-score="False">
<div class="vert-mod">
<div class="vert vert-0" data-id="block-v1:Totem+TP_PM_001+course+type@html+block@4cd3d02dea354898ad706a18a58e2e8e">
<div class="xblock xblock-public_view xblock-public_view-html xmodule_display xmodule_HtmlBlock" data-course-id="course-v1:Totem+TP_PM_001+course" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:Totem+TP_PM_001+course+type@html+block@4cd3d02dea354898ad706a18a58e2e8e" data-request-token="772dca3afb4411ecbdea0242ac12000a" data-graded="True" data-has-score="False">
<script type="json/xblock-args" class="xblock-json-init-args">
{"xmodule-type": "HTMLModule"}
</script>
<p>In the case below, the email attachment looks like a PDF, but in fact it’s not - it’s <strong>an executable file containing malware <em>disguised</em> as a PDF</strong>. In other words, it contains code that will install a virus or spyware onto your device if you download and open the attachment.</p>
<p></p>
<p style="text-align: center;"><img src="/assets/courseware/v1/3daada5845d984dd869d6ee43dd89982/asset-v1:Totem+TP_PM_001+course+type@asset+block/190327_email.png" alt="Email PDF" type="saveimage" target="[object Object]" width="70%" /></p>
</div>
</div>
</div>
<script type="text/javascript">
(function (require) {
require(['/static/js/dateutil_factory.be68acdff619.js?raw'], function () {
require(['js/dateutil_factory'], function (DateUtilFactory) {
DateUtilFactory.transform('.localized-datetime');
});
});
}).call(this, require || RequireJS.require);
</script>
<script>
function emit_event(message) {
parent.postMessage(message, '*');
}
</script>
</div>
<div class="xblock xblock-public_view xblock-public_view-vertical" data-course-id="course-v1:Totem+TP_PM_001+course" data-init="VerticalStudentView" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="vertical" data-usage-id="block-v1:Totem+TP_PM_001+course+type@vertical+block@b264cd792ba74130ab3bf0fae8570ac4" data-request-token="772dca3afb4411ecbdea0242ac12000a" data-graded="True" data-has-score="False">
<div class="vert-mod">
<div class="vert vert-0" data-id="block-v1:Totem+TP_PM_001+course+type@html+block@92a4169c16b64798aaece7e691ae4ea2">
<div class="xblock xblock-public_view xblock-public_view-html xmodule_display xmodule_HtmlBlock" data-course-id="course-v1:Totem+TP_PM_001+course" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:Totem+TP_PM_001+course+type@html+block@92a4169c16b64798aaece7e691ae4ea2" data-request-token="772dca3afb4411ecbdea0242ac12000a" data-graded="True" data-has-score="False">
<script type="json/xblock-args" class="xblock-json-init-args">
{"xmodule-type": "HTMLModule"}
</script>
<p>In the email below, you can see a blue button. This is actually just an <strong>embedded image</strong> that, when you click it, takes you to a phishing webpage - in this case, a fake Microsoft OneDrive sign-in page.<br /><br /></p>
<p><img src="/assets/courseware/v1/5f7fd740a77abad9b446fe588d83b483/asset-v1:Totem+TP_PM_001+course+type@asset+block/PhishingOneDrive.png" alt="Click Image" type="saveimage" target="[object Object]" preventdefault="function(){r.isDefaultPrevented=n}" stoppropagation="function(){r.isPropagationStopped=n}" stopimmediatepropagation="function(){r.isImmediatePropagationStopped=n}" isdefaultprevented="function t(){return!1}" ispropagationstopped="function t(){return!1}" isimmediatepropagationstopped="function t(){return!1}" width="100%" /></p>
</div>
</div>
</div>
<script type="text/javascript">
(function (require) {
require(['/static/js/dateutil_factory.be68acdff619.js?raw'], function () {
require(['js/dateutil_factory'], function (DateUtilFactory) {
DateUtilFactory.transform('.localized-datetime');
});
});
}).call(this, require || RequireJS.require);
</script>
<script>
function emit_event(message) {
parent.postMessage(message, '*');
}
</script>
</div>
<div class="xblock xblock-public_view xblock-public_view-vertical" data-course-id="course-v1:Totem+TP_PM_001+course" data-init="VerticalStudentView" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="vertical" data-usage-id="block-v1:Totem+TP_PM_001+course+type@vertical+block@a0ff776a1cad44dd9db45f7d5c55c30b" data-request-token="772dca3afb4411ecbdea0242ac12000a" data-graded="True" data-has-score="False">
<div class="vert-mod">
<div class="vert vert-0" data-id="block-v1:Totem+TP_PM_001+course+type@html+block@c6d4523946e74bcabf4560e09e1fe86c">
<div class="xblock xblock-public_view xblock-public_view-html xmodule_display xmodule_HtmlBlock" data-course-id="course-v1:Totem+TP_PM_001+course" data-init="XBlockToXModuleShim" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="html" data-usage-id="block-v1:Totem+TP_PM_001+course+type@html+block@c6d4523946e74bcabf4560e09e1fe86c" data-request-token="772dca3afb4411ecbdea0242ac12000a" data-graded="True" data-has-score="False">
<script type="json/xblock-args" class="xblock-json-init-args">
{"xmodule-type": "HTMLModule"}
</script>
<p>Phishing is not limited to emails! <strong>Phishing attacks are also carried out via messaging apps and social media</strong>, and often come in the form of a link forwarded by one of your contacts. These attacks tend to be quite contextualised - they might be in your own language, or refer to something happening in your local area.</p>
<p>The screenshot below is from a messaging app.</p>
<p></p>
<p style="text-align: center;"><img src="/assets/courseware/v1/ddc6d664ff15db95cf760a5452f2f84f/asset-v1:Totem+TP_PM_001+course+type@asset+block/190327_whatsapp.png" alt="Whatsapp Phishing" type="saveimage" target="[object Object]" preventdefault="function(){r.isDefaultPrevented=n}" stoppropagation="function(){r.isPropagationStopped=n}" stopimmediatepropagation="function(){r.isImmediatePropagationStopped=n}" isdefaultprevented="function t(){return!1}" ispropagationstopped="function t(){return!1}" isimmediatepropagationstopped="function t(){return!1}" width="350" /></p>
</div>
</div>
</div>
<script type="text/javascript">
(function (require) {
require(['/static/js/dateutil_factory.be68acdff619.js?raw'], function () {
require(['js/dateutil_factory'], function (DateUtilFactory) {
DateUtilFactory.transform('.localized-datetime');
});
});
}).call(this, require || RequireJS.require);
</script>
<script>
function emit_event(message) {
parent.postMessage(message, '*');
}
</script>
</div>
<div class="xblock xblock-public_view xblock-public_view-vertical" data-course-id="course-v1:Totem+TP_PM_001+course" data-init="VerticalStudentView" data-runtime-class="LmsRuntime" data-runtime-version="1" data-block-type="vertical" data-usage-id="block-v1:Totem+TP_PM_001+course+type@vertical+block@8f8b880d8e0f49d88dc0cc0fa6387c9a" data-request-token="772dca3afb4411ecbdea0242ac12000a" data-graded="True" data-has-score="False">
<div class="vert-mod">
<div class="vert vert-0" data-id="block-v1:Totem+TP_PM_001+course+type@problem+block@e7b6850563c3471bbe21216bcfc95177">
<div class="xblock xblock-public_view xblock-public_view-problem xmodule_display xmodule_ProblemBlock" data-course-id="course-v1:Totem+TP_PM_001+course" data-block-type="problem" data-usage-id="block-v1:Totem+TP_PM_001+course+type@problem+block@e7b6850563c3471bbe21216bcfc95177" data-request-token="772dca3afb4411ecbdea0242ac12000a" data-graded="True" data-has-score="True">
<div class="page-banner"><div class="alert alert-warning"><span class="icon icon-alert fa fa fa-warning" aria-hidden="true"></span><div class="message-content">Quiz is only accessible to enrolled learners. Sign in or register, and enroll in this course to view it.</div></div></div>
</div>
</div>
<div class="vert vert-1" data-id="block-v1:Totem+TP_PM_001+course+type@problem+block@808f6047f47947a6989b2c4d81c8faf9">
<div class="xblock xblock-public_view xblock-public_view-problem xmodule_display xmodule_ProblemBlock" data-course-id="course-v1:Totem+TP_PM_001+course" data-block-type="problem" data-usage-id="block-v1:Totem+TP_PM_001+course+type@problem+block@808f6047f47947a6989b2c4d81c8faf9" data-request-token="772dca3afb4411ecbdea0242ac12000a" data-graded="True" data-has-score="True">
<div class="page-banner"><div class="alert alert-warning"><span class="icon icon-alert fa fa fa-warning" aria-hidden="true"></span><div class="message-content">Quiz is only accessible to enrolled learners. Sign in or register, and enroll in this course to view it.</div></div></div>
</div>
</div>
</div>
<script type="text/javascript">
(function (require) {
require(['/static/js/dateutil_factory.be68acdff619.js?raw'], function () {
require(['js/dateutil_factory'], function (DateUtilFactory) {
DateUtilFactory.transform('.localized-datetime');
});
});
}).call(this, require || RequireJS.require);
</script>
<script>
function emit_event(message) {
parent.postMessage(message, '*');
}
</script>
</div>