Want to save your progress?
Create a free account to track your lessons and quizzes across devices.
Register Login
« Back to ClassCompleted: 50%

The Threat Landscape

Page 2 of 2


Social Engineering: Hacking the Human

Technical defenses can be bypassed if a human is tricked into giving away access. Social Engineering relies on psychological manipulation.

  • Phishing: Sending fraudulent emails that appear to come from a reputable source (e.g., "Your bank account is locked") to induce individuals to reveal personal information.
  • Spear Phishing: A highly targeted phishing attack customized for a specific individual or organization.
  • Vishing (Voice Phishing): Using phone calls to trick victims.
  • Pretexting: Creating a fabricated scenario (the pretext) to steal information (e.g., pretending to be an IT support technician needing your password to "fix" your account).