Want to save your progress?
Create a free account to track your lessons and quizzes across devices.
Register Login
Create a free account to track your lessons and quizzes across devices.
Register Login
« Back to ClassCompleted: 50%
The Threat Landscape
Page 2 of 2
Social Engineering: Hacking the Human
Technical defenses can be bypassed if a human is tricked into giving away access. Social Engineering relies on psychological manipulation.
- Phishing: Sending fraudulent emails that appear to come from a reputable source (e.g., "Your bank account is locked") to induce individuals to reveal personal information.
- Spear Phishing: A highly targeted phishing attack customized for a specific individual or organization.
- Vishing (Voice Phishing): Using phone calls to trick victims.
- Pretexting: Creating a fabricated scenario (the pretext) to steal information (e.g., pretending to be an IT support technician needing your password to "fix" your account).