CLASSIFICATION: OKTA, INC. PUBLIC There is a relationship between phishing and the presence of: ❏ Urgency ❏ Authority ❏ Very long URLs ❏ Unsolicited emails ❏ Incredible “deals” ❏ Financial information request Propositions
CLASSIFICATION: OKTA, INC. PUBLIC Monitor for new emails within the user mailbox Label the newly received email Extract the email content Predict and check if the email content is safe Provide feedback Functional requirements
CLASSIFICATION: OKTA, INC. PUBLIC • Register for the Framework by following the instructions • Deployed on the Google Cloud Platform. • The user should provide access to their email account within a web browser • The email access request should clearly state the access scope needed • The initial email labelling should take a maximum of 2 seconds when a new email is received • The Phishing Email Framework should take no longer than 10 seconds to provide an outcome Non-functional requirements