Chapter 62. Phishing_Video_with_Questions

62.1 Section Title

true
true
Phishing

Watch the video below to see social information processing theory in action. To review this topic, go to the section, “Cyber Attacks” in Chapter 2.

Download transcript.

Questions

After watching Phishing, consider the questions below. Then “submit” your response.

Question

X1LGXkuwlSBEJv30xlf2e4rt+AfMZRpk5q845dRY2Tlfxx/HkUHxfv28nxw8WrOKvE0pHJdevwQTIc1kwz/S1GNVpF/CosvY754x+d5NDxHjotuUuQg1flZTS9PWUgGE9YpmEA==
One possible answer might be that Sam and Chelsea realize that the message does not contain the bank’s logo or company branding, it was not sent by an individual employee of the bank, and that it asks for a social security number, which seems unnecessary.

Question

2idmp2ux3x7qB+3RTymJrCMv2gsmZCUBn3b9cx9uODG0UuonwPaipfTjIkSGDVURa+Jita5QTKqA/iVocD9NWgEec2MAWg/TsQhn5RATbjHVINvsns06ZipPHvHTB+vSrihC8/eHNNI3lZgMI1fL4ujna17ELtZwF9w0mK5Z9yNLXcBYb55IBvMTCCqhx2Ah
Responses will vary.