0
0
Intro to Computingfundamentals~10 mins

Social engineering awareness in Intro to Computing - Draw & Build Visually

Choose your learning style9 modes available
Draw This - beginner

Draw a flowchart that shows the steps a person should take when they receive an unexpected email asking for sensitive information. Include decision points for verifying the sender and deciding whether to respond or report the email.

10 minutes
Hint 1
Hint 2
Hint 3
Hint 4
Hint 5
Grading Criteria
Start and End symbols present
Decision diamonds used for checking sender and verification
Clear steps for verifying sender identity
Separate paths for known and unknown senders
Actions to not respond and report suspicious emails included
Flow leads to protecting personal information
Solution
  +---------------------+
  | Start: Receive Email |
  +----------+----------+
             |
             v
  +-------------------------+
  | Is sender known/trusted?|
  +-----------+-------------+
              |Yes                   |No
              v                      v
  +---------------------+   +-------------------------+
  | Is request for      |   | Verify sender identity  |
  | sensitive info?     |   +-----------+-------------+
  +-----------+---------+               |
              |Yes                   Verified?
              v                      +---+---+
  +---------------------+           |Yes| No |
  | Do not respond.     |           +---+---+
  | Report email to IT. |             |   |
  +-----------+---------+             |   v
              |                       | +---------------------+
              v                       | | Do not respond.     |
  +---------------------+           | | Report email to IT. |
  | End: Protect info    |           | +---------------------+
  +---------------------+           |
                                    v
                          +---------------------+
                          | End: Protect info    |
                          +---------------------+

This flowchart starts when a person receives an email.

First, they check if the sender is known or trusted.

If yes, they check if the email asks for sensitive information.

If it does, they do not respond and report the email to IT to stay safe.

If the sender is not known, they try to verify the sender's identity.

If verification succeeds, they follow the same rule: do not respond to sensitive requests and report.

If verification fails, they do not respond and report the email.

All paths end with protecting personal information by not sharing it and reporting suspicious emails.

Variations - 2 Challenges
[intermediate] Draw a flowchart for handling a phone call from someone claiming to be IT support asking for your password. Include steps to verify the caller and decide whether to share information or hang up.
[advanced] Draw a detailed flowchart showing how to recognize and respond to a phishing website link received via email or message. Include steps for checking URL, reporting, and avoiding clicking suspicious links.