IT Tutorial 1 Part 1
IT Tutorial 1 Part 1
1. Phishing: The attacker sends an email or message pretending to be a trusted source, such
as a bank or social media platform, and asks the victim to provide personal information
or click on a malicious link.
2. Pretexting: The attacker creates a false scenario or pretext to gain the victim's trust and
gather personal information, such as posing as a technical support representative or a
government agency.
3. Baiting: The attacker offers the victim something in exchange for personal information,
such as a free gift card or a fake job offer.
4. Impersonation: The attacker impersonates someone in a position of authority, such as an
IT administrator, to gain access to sensitive information or systems.
5. Tailgating: The attacker gains physical access to a secure area by following someone who
has authorized access, without presenting proper identification or credentials.