Week 8 - Phishing Link

Marcus Rogelio

BSIT380

Dr. Collins

7/26/24

Phishing links


Week 8 discussed automated security, and the structure of how it works was explained. There are several ways that threat actors would access the user's computer, such as by phishing links, which are very problematic to deal with as they can damage the computer and establish suspicious activity on the user's device.

Phishing links are everywhere and are related to technology that can communicate through the user. So, the book discusses how to increase the suspicion of mail and make a judgment call about whether it is a scammer or a natural person. 

To be frank with everyone, it is not easy. But there is one thing to make sure of by looking at attachments and links, which is a big no-no. If it is a suspicious link, delete it

Work purposes are allowed, but it may be wise to ask your local employee if their attachment and link are legit. I still need to recommend not opening links. 


Comments

Popular posts from this blog