Page 29 - Cyber Safety C-5
P. 29
21 st
IS IT A PHISH OR WISH? Century #Critical Thinking THE PROCESS BEHIND PHISHING
Skills
We learned that phishing is like a trick with bait. Now, let's explore how the trap
Below are ten statements. Put each one under the correct heading. works once the bait is set. The following are the simple steps a hacker follows to
A phish is a suspicious or unsafe message. steal your information:
A wish is a safe, normal message. 1
Attacker sends phishing mail to target
Phish Wish
Attacker 3 Victim
4 Victim enters private
Hacker uses victim's information like name, 2
credentials to access address, bank details Victim clicks on the
private information on the fake website phishing link and
visits fake website
Original Website Phishing Website
Messages:
Your parcel is arriving tomorrow. Your private information is like a secret treasure map, containing valuable details
that hackers want to steal. It includes:
Your account will be closed in 2 hours. Click fast!
Your school uploaded the timetable.
You won a lucky draw. Share PAN details to receive `5000.
Dad shared your photo through the family group.
Update your UPI PIN here to stop a fraud.
New homework posted on the class app.
Your friend tagged you in a meme.
Passwords and PINs: Keys to your online accounts and devices.
Congratulations! Click to claim holiday tickets!
One-Time Password (OTP): A unique code sent to your phone for added security.
Your teacher edited the project file.
Aadhaar Number and PAN Card details: Personal identification and tax
information.
Bank Account Numbers and Credit/Debit Card details: Financial information
used for transactions.
Phishing: Don't Get Hooked 27

