Matching Pairs Social Engineering Online version Social Engineering Techniques by Kathy San 1 Smishing 2 Phishing 3 Shoulder Surfing 4 SPIM 5 Dumpster Diving 6 Tailgating 7 Spam 8 Spear Phishing 9 Eliciting information 10 Vishing 11 Pharming 12 Whaling A website attack technique that hackers use to redirect users from a legitimate site to a fake site. Attacker spying over your shoulder watching to steal personal information. An email attack targeting specific individual or group. Target emails. Usually spam with typo errors and requesting users to click on a malicious link. A technique that involves following someone into a secure area. Attacker who uses phone calls or leaving voice messages defrauding to gain sensitive information over the phone. Unwanted junk email sent out in bulk. Spam messages sent through instant messages like WhatsApp, Skype, or other chatting platforms. A phishing attack that targets high-ranking officials such as a CEO or other top-level executives. Attackers who gain useful information searching through trash. An attack using text messages. A technique that is used to discreetly gather information. Usually, a casual conversation to extract information.