1 | 5 | ||||||||||||||||||||
2 | |||||||||||||||||||||
4 | |||||||||||||||||||||
3 | |||||||||||||||||||||
1. A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information.
2. The act of manipulating people into performing actions or divulging confidential information.
3. A method of social engineering where an unauthorized person follows an authorized individual to gain access to a restricted area.
4. A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.
5. A targeted form of phishing where attackers tailor fraudulent emails to specific individuals or organizations.