Concept Flow - Phishing and social engineering
Attacker plans attack
Crafts deceptive message
Sends message to target
Target receives message
Target decides to trust?
No→Ignore message
Yes
Target shares sensitive info or clicks link
Attacker gains access or info
Attack success or failure
This flow shows how an attacker creates a fake message to trick a person into giving sensitive info or access, leading to a successful phishing or social engineering attack.