0
0
Intro to Computingfundamentals~10 mins

Social engineering awareness in Intro to Computing - Flowchart & Logic Diagram

Choose your learning style9 modes available
Process Overview

Social engineering is a trick used by bad people to get secret information by pretending to be someone trustworthy. This flowchart shows how to recognize and respond to social engineering attempts to keep your information safe.

Flowchart
Rectangle
Yes No
Rectangle
No Yes
Rectangle
Rectangle
This flowchart shows the step-by-step process to handle unexpected requests for information, including checking if the request is suspicious, verifying identity, and deciding whether to share information or report the incident.
Step-by-Step Trace - 4 Steps
Step 1: Receive an unexpected request asking for your password.
Step 2: Ask yourself if the request seems suspicious or unusual.
Step 3: Since the request is suspicious, try to verify the identity of the requester by calling them back on a known number.
Step 4: If you cannot confirm the identity, do NOT share any information and report the incident to your security team.
Diagram
 +-------------------+       +---------------------+       +-------------------------+
 | Unexpected Request| ----> | Check if Suspicious | ----> | Verify Requester's ID   |
 +-------------------+       +---------------------+       +-------------------------+
                                                                |            |
                                                                |Yes         |No
                                                                v            v
                                                  +-------------------+  +---------------------+
                                                  | Provide Info if   |  | Do NOT Share Info &  |
                                                  | Request is Safe  |  | Report Incident      |
                                                  +-------------------+  +---------------------+
This diagram shows the flow of handling a social engineering attempt: starting from receiving a request, checking if it is suspicious, verifying the requester, and then deciding to share information or report the incident.
Flowchart Quiz - 3 Questions
Test your understanding
What should you do first when you receive an unexpected request for sensitive information?
AImmediately share the information
BCheck if the request seems suspicious or unusual
CIgnore the request without thinking
DReport the incident without checking
Key Result
Always check if a request for information is suspicious and verify who is asking before sharing anything to protect yourself from social engineering.