On the internet, attempts by individuals to obtain confidential information from you by falsifying their identity are known as what?

Difficulty: Easy

Correct Answer: Phishing scams

Explanation:


Introduction / Context:
This question is from cyber security awareness and deals with a common online threat. Many users receive emails, messages or fake websites that try to trick them into revealing passwords, bank details or other sensitive information. The process of pretending to be a trustworthy entity to steal such data has a specific name that appears frequently in security warnings, banking advisories and competitive exam questions. Recognising this term is key to understanding online safety instructions.


Given Data / Assumptions:

  • Attackers are trying to obtain confidential information such as passwords or financial data.
  • They do this by falsifying their identity, for example by posing as a bank or a trusted website.
  • The question is asking for the term used for such attempts.
  • Options include phishing scams, computer virus attacks, spyware scams, hacking attempts and phishing trips.


Concept / Approach:
The practice of sending fraudulent messages that appear to come from reputable sources in order to trick individuals into disclosing personal information is called phishing. A phishing scam often uses fake emails, SMS messages or websites that closely resemble genuine ones, encouraging users to click links or enter login details. Computer viruses, spyware and hacking are related concepts, but they describe different technical mechanisms such as self replicating code, hidden monitoring programs or direct system intrusion. The important clues in the question are obtaining confidential information and falsifying identity, which together describe phishing scams most accurately.


Step-by-Step Solution:

Step 1: Notice that the attacker is not necessarily installing a program on your device but is trying to trick you personally into giving information. Step 2: Recognise that the attacker pretends to be someone else, such as a bank, social network or government agency. Step 3: Recall that this social engineering technique is widely known as phishing, where the attacker is fishing for information with false bait. Step 4: Look at the options and select phishing scams, which matches the standard terminology. Step 5: Confirm that computer virus attacks, spyware and general hacking are broader categories and do not match the description as closely as phishing scams do.


Verification / Alternative check:
Banks, payment apps and email providers regularly send awareness messages warning users about phishing scams. They advise users never to click on suspicious links or share OTP, PIN or passwords in response to emails or calls. Cyber security websites classify phishing as a major type of social engineering attack. In contrast, computer viruses are defined as malicious programs that replicate and spread, and spyware is code that secretly monitors user activity. Because the question focuses on fraudulent identity and asking for information rather than on code, existing definitions confirm that phishing scams is the correct answer.


Why Other Options Are Wrong:

  • Computer virus attacks: These involve malicious software that can damage files or systems, but they are not specifically about fake identities trying to steal data through messages.
  • Spyware scams: Spyware collects information secretly by running on your device, not mainly by sending fake messages asking you to reply.
  • Hacking attempts: Hacking may involve breaking into systems without user interaction, whereas phishing relies on tricking the user.
  • Phishing trips: This is not a standard term; it plays on the word but is not used in security literature.


Common Pitfalls:
Some learners confuse phishing with general viruses because both are cyber threats. Others may focus on spyware, since that also steals data. The key difference is the method used. Phishing relies on deception through communication, asking the victim to voluntarily type or send confidential information. Malware such as viruses and spyware is code that directly runs on the system. When a question emphasises falsifying identity and direct requests for confidential information, phishing scams should be your first thought.


Final Answer:
Attempts to obtain confidential information by faking identity are called Phishing scams.

Discussion & Comments

No comments yet. Be the first to comment!
Join Discussion