Wednesday, October 22, 2025

Digital security

 Problem 2: Phishing Attacks

1.Definition

Phishing is a type of cyber attack where attackers trick you into giving up personal information like usernames, passwords, or bank details by pretending to be someone trustworthy (e.g., your bank, a friend, or a company).

Phishing usually comes in the form of:

  • Emails

  • Text messages (SMS phishing or "smishing")

  • Instant messages

  • Fake websites that look real

2.Good Links for Information

Here are some trusted sources where you can learn more:

  1. Cybersecurity & Infrastructure Security Agency (CISA)

  2. National Cyber Security Centre (UK)

  3. Google - How to identify phishing

  4. Norton - Guide to phishing

  5. Microsoft Security

3.Five Good Tips to Avoid or Solve Phishing Attacks

  1. Never click on suspicious links or attachments

    • Always double-check the sender's email address and hover over links to see where they go before clicking.

  2. Use Two-Factor Authentication (2FA)

    • Adds an extra layer of protection even if your password is stolen.

  3. Keep your software and antivirus updated

    • Security updates help protect against the latest phishing tactics and malware.

  4. Use unique, strong passwords for every account

    • A password manager can help you remember them.

  5. Report phishing attempts

4. Feedback Form: What’s the Best Tip?

Please vote the tip you think is the most helpful:

5.Chart Online Form Results

Below is a mock-up chart showing results from 200 users who voted for the best anti-phishing tip:

TipVotesPercentage
Tip 16532.5%
Tip 24020%
Tip 33517.5%
Tip 43015%
Tip 53015%

Most popular tip: Tip 1: Avoid suspicious links and attachments

5 comments:

  1. Phishing is still a major online threat because it targets people, not systems. Staying alert, double-checking emails, and using multi-factor authentication are simple ways to stay safe. Great post for raising awareness!

    ReplyDelete
  2. Thank you for reporting these problems and providing solutions.

    ReplyDelete
  3. I really enjoyed reading your post and the answers you picked.

    ReplyDelete
  4. Great job on your blog You explained phishing in a really clear and simple way. It’s easy to understand and very informative.

    ReplyDelete
  5. It's a good job, I like how you specified the percentages and the links, everything is perfect

    ReplyDelete

IMAGES

  IMAGEN REAL     EDITED IMAGE This project consists of editing an image using the program GIMP. The main objective was to change the origin...