Phishing is a social engineering technique in which attackers disguise themselves as trustworthy entities in electronic communication. They often use emails or websites that closely resemble genuine ones to lure users into entering sensitive information. Such data can then be misused for identity theft or financial fraud. The scenario in this option captures the deceptive and fraudulent nature of phishing.
Option A:
This option correctly emphasises that the email appears legitimate but is actually fraudulent. The attackerโs goal is to obtain confidential data such as login credentials, bank details or OTPs. Recognising such attempts is an important ICT security awareness outcome for students and staff.
Option B:
Legitimately updating a password on the official portal is a recommended security practice, not an example of fraud. The user interacts with a genuine site and improves account protection. Hence, this behaviour is the opposite of phishing.
Option C:
Regular backups contribute to data availability and disaster recovery, not to social engineering attacks. They are a positive security measure undertaken by administrators. Therefore, this action is unrelated to phishing.
Option D:
Downloading open-source software from verified sources can be safe if checksums and signatures are verified. This behaviour shows cautious ICT use rather than falling for deceptive schemes. Thus, it is not an example of phishing.
Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!