1 | 4 | ||||||||||||||||||||||
2 | |||||||||||||||||||||||
5 | |||||||||||||||||||||||
3 | |||||||||||||||||||||||
1. A method of social engineering where an unauthorized person follows an authorized individual to gain access to a restricted area.
2. A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.
3. The act of manipulating people into performing actions or divulging confidential information.
4. A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information.
5. A targeted form of phishing where attackers tailor fraudulent emails to specific individuals or organizations.