Script

edited January 2018 in User Guides

The following script assumes that you are in the Phishing: A Method of Social Engineering in Cybersecurity book in landscape orientation.

  1. Navigate with the Slider Bar
    Touch and move the slider dot at the bottom of the screen to the Table of Contents. Refer to the titles of pages appearing in a black bar at the bottom of the page as you slide to find the TOC.

  2. Link from the TOC
    Tap the What Does Phishing Look Like? link (under Introduction to Phishing link) in the TOC. You may see highlighted passages of text that were saved in a previous session.

  3. Use the Discussion feature
    Tap the Discuss button corresponding to the “What might make this email attack effective where others fail?” question. Type some text in the text field and tap the Submit button to observe the discussion, if there has been any for this item and if you are connected to the PeBL server. Your text will appear in the list of submissions (give it a few seconds). Swipe to scroll up and down to see all responses. If you are disconnected, the text you entered is cached and synched to the PeBL server later.

  4. Flip to the next page
    Tap the Cancel button to return to the underlying page. Flip the page by swiping left, imitating physical page flipping.

  5. Link internally to another section
    Tap the Lesson 4 link in the left column to go to that section of the book. Links can be set to any location in the current book, not just major section headings like Lesson 4.

  6. Use the Notes feature
    Flip forward about 4 more pages until you get to the 4.2 Pretexting section. Tap the Notes button (book icon) in the left column to open it. Notes can contain text, links, resources, caveats to watch for, important material to highlight, etc. Close the Notes window using the Close button (X icon).

  7. Use the Show | Hide Content feature
    Tap the Show | Hide Content button (up or down arrow icon) next to the Notes button to show or hide additional content pertinent to this topic. The contents of the book are reflowable, so the shown content appears in line with the existing content of the book, and page numbering updates dynamically as the content increases or decreases. The default state (shown or hidden) of individual occurrences of this feature in the book can be set through external systems (such as a learner profile or competency management system) which the user can override. Note that this Show | Hide Content feature adds or subtracts a block of content, whereas the Content Morphing feature (described later) actually swaps between different versions of the same content information. These two features make it possible to completely customize content in a PeBL book for different users, depending on their learning needs, preferences, etc.

  8. Use the Glossary Hotword feature
    Tap “cognitive biases” (phrase with dotted line under it) to pop up a definition. Touch the definition to close.

  9. Use the Highlight feature
    Touch and hold to bring up the highlighting menu, then drag the selection indicators to select some text. Tap the Delete button (trash icon) to remove the highlight.

  10. Add an annotation
    Touch and hold then drag on some other text to bring up the highlight menu. Choose Note. The Note box appears. Enter some text, then tap OK. All user highlights and their associated annotations are persistent and sharable with other users, as will be shown next.

  11. View the annotation just added
    Tap the List button (bullets and lines icon) in the top left corner of the screen (to the right of the Bookshelf link). Tap Annotations in the top menubar. All text that you (or others under the same login ID) have highlighted appears in the User Annotations section, with the annotation text you entered. Tap the text piece just highlighted or close the window (red X in upper left corner) to go back to the page you were on.

  12. Share an annotation
    Select and highlight different text. Tap the Share button. The highlight turns to a light blue color, which means you have shared this highlight with other users. Annotations shared with you by other users appears in light red. Annotations that are not shared appear in yellow. Currently sharing is with all other users of this book, but in the near future you will be able to select specific users to share with, and allow viewing shared text from other users of the same book. Tap the List button in the top left corner of the screen and tap Annotations as in the previous step. Annotations that are not shared are shown in the "User Annotations" section, and shared annotations appear in the "Shared Annotations" section. Tap the text piece just highlighted or close the window (red X in upper left corner) to go back to the page you were on. Unshare the annotation you previously entered by tapping it and selecting Unshare.

  13. Bookmark a page
    Tap List button>Table of Contents>Telephonic phishing to go to that section of the book. Touch the Bookmark button (bookmark icon) in the upper right corner of the screen. In the Add Bookmark box, enter text. Touch OK. The button becomes filled with red to show that this page has been bookmarked. Tap the List button in the top left of the screen. Tap Annotations to view the bookmark you just created (in the Bookmarks section at the bottom of the page).

  14. Use the Content Morphing feature
    Tap the page number on the right side of the bookmark row you just left (as shown in the Annotations window) to return to the page. Go to the Website forgery section (immediately preceding the start of 2.2 Telephonic phishing) in the left column, 2nd paragraph, and touch the Content Morph button (dial icon) in the upper right corner of this paragraph. Yellow (“Basic”) is probably the current setting, depending on the login ID you used; select the other (“Advanced”). Notice that the paragraph is replaced by the different version and the content reflows. As mentioned earlier, the default version can be set via an external system. Any portion of the book’s content is morphable; a PEBL book’s content could be 100% tailorable to the user’s skill, reading level, etc. through an external system (e.g., student profile), an instructor, or by the users themselves.

  15. Watch an embedded media object
    Flip to the next page. Play the video. Video viewing behavior is tracked by the Experience API (xAPI) and displayed in the PeBL dashboard. Many kinds of interactive media objects (e.g., games, simulations) can be included in PeBL books, using the same methods for embedding these objects in web pages, since PeBL uses an HTML 5 backbone.

  16. Use the Practical Exercise feature
    Tap the List button>Table of Contents and navigate to the _7.2 Step: 1: Select a Target _ section (under 7 Conducting a Phishing Attack). Flip to the next page. Tap Respond in the Practical Exercise (where it says “Describe your overall goal for the phishing attack…”). Enter some text and tap Submit. Your text will appear in the list of submissions (give it a few seconds). This is similar to the Discussion feature shown earlier, but has a different instructional purpose (practicing what you learned). In a future version, a text editor will be included with formatting options, and users will be able to rate each other’s work.

  17. Use the Retrieval Practice feature
    Tap the List button>Table of Contents. Go to the Retrieval Practice section at the end of the book. Try answering a few questions (deliberate right answers, deliberate wrong answers). Your performance is tracked by the xAPI and will be viewable on the PeBL dashboard.

Sign In or Register to comment.