Phishing Scams

Lucy Corlett
Mind Map by Lucy Corlett, updated more than 1 year ago
Lucy Corlett
Created by Lucy Corlett over 1 year ago


A mind map on how to identify phishing and how to deal with emails you think might be a scam.

Resource summary

Phishing Scams
  1. Phishing
    1. How to identify phishing
      1. Impersonalised greeting
        1. The phishers won't know your real name!
        2. Bad grammar
          1. The phishers often won't bother to proofread their work, so look out for spelling and grammar mistakes
          2. Variation on genuine address
            1. They won't use their personal email address, so usually they will alter a real one.
            2. False link
              1. If there is a link included in the email, roll your mouse over it to check it leads to where it says it does
              2. Personal information
                1. Phishers will often ask for information such as bank details or date of birth
                2. Urgency
                  1. Often there will be a deadline for the information requested. e.g. "If you do not submit your account details by midnight tomorrow, your account will be closed and you will lose any money saved in it."
                3. How to deal with a phishing email
                  1. Ring up the person they're pretending to be to check if the email is real
                    1. You never know, it might be a genuine email
                    2. Save a copy of the email
                      1. This can be used as evidence if you tell anybody
                      2. Report it as phishing
                        1. You can do this by clicking on the report button or reporting it on an online website
                    Show full summary Hide full summary


                    A level Computing Quiz
                    Zacchaeus Snape
                    Types and Components of Computer Systems
                    Jess Peason
                    Input Devices
                    Jess Peason
                    Output Devices
                    Jess Peason
                    Kwame Oteng-Adusei
                    Pack of playing cards answer
                    Karl Taylor
                    Code Challenge Flow Chart
                    Charlotte Hilton
                    System Threats
                    Ella Fisher Scott
                    Passwords & Security
                    Lucy Corlett
                    Computing Hardware - CPU and Memory
                    Shantal K Green
                    Computing Hardware - CPU and Memory
                    Paul Jamrozy