The ins and outs of phishing - answering who, what, why, how, where, and when
Social engineering is when someone attempts to manipulate someone else into performing actions they otherwise wouldn’t, like opening an email, clicking a link in an email or text message, or downloading an attachment.
The theory behind social engineering is based on Robert Cialdini’s work on ‘influence’, setting out six key principles. Click the icons below to learn more about these principles:
A user is more likely to perform an act (e.g. provide sensitive information) if the attacker claims they will or need to perform a related act (e.g. deliver goods).
A user, having committed to something (e.g. clicking a link in an email) is likely to continue (e.g. enter the information requested).
A user is more likely to trust something (e.g. an email making a request) when it appears to come from a person or organisation they trust (e.g. their bank).
A user is more likely to perform an act (e.g. open an attachment) if it appears that others, who are generally trustworthy or knowledgeable, are doing the same.
A user is more likely to perform an act if it appears to come from a person or organisation they like (e.g. a contact on LinkedIn).
A user is more likely to perform an act if it appears to be exclusive or time-limited (e.g. an email needing action now to avoid consequences).
Phishing is one threat that can impact the security of schools and organisations. Alongside this resource, we provide further support, as well as training to ensure better protection.