Activity 3

Before we move on to the next section, check your understanding by answering this review question below: 

  1. Discuss the role of cognitive biases in phishing vulnerability. How do factors such as confirmation bias and anchoring bias influence victims' decision-making processes? 

  1. Explore the ethical implications of using social engineering techniques in phishing attacks. How do these tactics exploit victims' vulnerabilities and contribute to a culture of fear and mistrust? 

How do you think you did? Are there any areas you would like to discuss further? Feel free to post a message below. 


Separate groups: All participants
(There are no discussion topics yet in this forum)