FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS PHISHING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following most closely matches the definition of ‘Blagging’?
A
Sending an e-mail to a user pretending to be someone else
B
Hacking a person’s computer
C
Tricking a person into revealing some personal information
D
Observing a legitimate user entering a password
E
Setting up a fake website that looks like an official website
Explanation: 

Detailed explanation-1: -Phishing: This technique uses trickery and deceit to obtain private data from users. The social engineer may try to impersonate a genuine website such as Yahoo and then ask the unsuspecting user to confirm their account name and password.

Detailed explanation-2: -A Phishing attack is the most well-known social engineering tactic. A phishing attack uses an email, website, web ad, web chat, SMS or video to inspire its victims to act.

Detailed explanation-3: -Social engineering is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. The hacker might use the phone, email, snail mail or direct contact to gain illegal access.

Detailed explanation-4: -Social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

There is 1 question to complete.