How to complete Threat Simulation Assignments

This article provides a step-by-step guide for completing your Threat Simulation Assignments.

Once you log in to the user portal, look for any assignments categorized under "Threat Simulation". These assignments are designed to help you develop your skills in identifying potential security threats. Follow the steps below to successfully complete them.

  1. Review the Email
    Begin by carefully reviewing the content of the threat simulation email. It's essential to examine all elements present in the email to assess its authenticity. Pay close attention to the sender's address, the subject line, and the body of the message. Consider whether the tone and language used are appropriate for the sender and the context. Look for any inconsistencies or unusual requests that could indicate a phishing attempt or other malicious intent.
  2. Determine the Safety of the Email
    Threat simulation assignments typically start with the question: "Is this email safe?" You will need to select either "Yes" or "No". This initial assessment is critical as it sets the stage for your evaluation of the email's content.

    If you indicate that the email is Safe and it is indeed safe, you will receive a score of 100%. However, if you mistakenly mark it as Safe when it is unsafe, you will receive a score of 0%, and the application will highlight the unsafe aspects of the email that you overlooked. This feedback is valuable for learning, as it allows you to understand the signals that may have indicated a threat.

    Conversely, if you identify the email as Unsafe, you will move on to the next step, where you will need to click on all the elements of the email that you deem unsafe. This could include links that appear suspicious, requests for personal information, or attachments that seem out of place.
  3. Identify Red Flag Hints
    In this step, thoroughly examine the email for any suspicious elements, including wording, links, buttons, images, and more. Look for common red flags such as poor grammar or spelling mistakes, which can be indicative of a phishing email. Additionally, check the URLs of any links included in the email by hovering over them to see if they direct to a legitimate website.
  4. Submit Your Changes
    After identifying all the unsafe parts, click the "Submit" button to complete your threat simulation assignment. Your score will be based on the number of red flags you successfully identify, reinforcing the importance of attention to detail in recognizing potential threats.

Be sure to complete your assignments ahead of their due date to help maintain your company's security! By practicing these skills regularly, you contribute to a safer work environment and enhance your ability to spot potential vulnerabilities in the future.