What technique do threat actors use to exploit human psychology, rather than technical vulnerabilities, to gain unauthorized access or information?

  • Encryption
  • Firewall
  • Intrusion Detection System (IDS)
  • Phishing
'Phishing' is a technique where threat actors use social engineering to manipulate human psychology and trick individuals into revealing sensitive information or granting unauthorized access.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *