Social Engineering refers to the psychological manipulation of people into performing actions or divulging confidential information. It exploits human error rather than technical software flaws.
Phishing: This involves sending fraudulent communications (usually emails) that appear to be from a reputable source. The goal is to coax the user into clicking a malicious link or providing login credentials on a fake interface.
Pharming: A more technical form of social engineering where an attacker redirects a user to a fraudulent website even if the user types the correct URL. This is achieved by altering DNS (Domain Name System) settings or poisoning the local host file.
Key Differences: Phishing requires the user to take a specific action based on a message, whereas Pharming can happen silently in the background of a web session.
Malware is a broad term for any software created with malicious intent to cause harm, steal data, or disrupt system operations. It is often delivered via illegitimate downloads or infected attachments.
Computer Virus: A program that can replicate itself by attaching to other files. It is designed to spread across systems and perform unwanted actions like corrupting or deleting data.
Trojan Horse: A type of malware that disguises itself as legitimate or useful software. Unlike viruses, Trojans do not replicate; they rely on users being tricked into installing them to open a 'backdoor' for attackers.
Spyware: Software that secretly monitors and records user activity. It can capture keystrokes (keylogging), record screens, and access sensitive files to send them to a third party.
| Feature | Phishing | Pharming | Hacking |
|---|---|---|---|
| Primary Vector | Fraudulent Communication | Infrastructure Redirection | Technical Exploitation |
| User Interaction | High (Must click/respond) | Low (Automatic redirection) | Variable (Often silent) |
| Target | Human Psychology | Network Configuration | System Vulnerabilities |
| Prevention | Staff Training/Filters | DNS Security/URL Checks | Firewalls/Patching |
Technical Controls: Installing and regularly updating anti-malware software is critical for detecting known threat signatures. Firewalls act as a barrier to block unauthorized incoming traffic.
Administrative Controls: User education is the most effective defense against social engineering. Training staff to recognize suspicious URLs and verify email senders can prevent most phishing attacks.
System Hygiene: Keeping all software up to date with security patches ensures that hackers cannot exploit known bugs. Implementing User Access Levels ensures that even if one account is compromised, the damage is contained.
Identify the Trigger: In exam scenarios, if the attack starts with an email or message, it is almost certainly Phishing. If the user types a correct address but ends up on a fake site, it is Pharming.
Replication vs. Disguise: Always distinguish between a Virus (which replicates and spreads) and a Trojan (which hides inside something else but does not self-replicate).
Check the Impact: If the question mentions recording passwords or monitoring habits, the answer is likely Spyware. If it mentions deleting files or crashing the system, look toward Viruses or Hacking.
Multi-Layered Defense: When asked for prevention, always provide a mix of technical (e.g., firewalls) and human (e.g., training) solutions for full marks.