Want to create interactive content? It’s easy in Genially!

Get started free

Data Security Terms

Andrea Martinez

Created on September 22, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Customer Empathy Map

Squares Diagram

Customer Journey Map

HR Organizational Chart

SWOT PRO

Branching diagram

Fishbone Diagram

Transcript

Key Terminology

SMSishing

Spam

Vishing

Phishing

Info

Info

Info

Info

Vishing

Vishing, short for "voice phishing," is a type of cyber attack where attackers use voice communication technology, such as phone calls or voice messages, to deceive individuals into revealing sensitive information or performing certain actions. In vishing attacks, attackers typically impersonate trusted entities, such as banks, government agencies, or service providers, and use social engineering tactics to manipulate victims into divulging confidential information, such as account credentials, credit card numbers, or personal identification details.

SMSishing

SMSishing, also known as SMS phishing or smishing, is a type of cyber attack where attackers use text messages (SMS) to deceive recipients into revealing sensitive information or performing certain actions. In SMSishing attacks, recipients may receive text messages containing links to fake websites or prompts to reply with personal information, such as account credentials, social security numbers, or financial details. These messages may create a sense of urgency or use social engineering tactics to manipulate recipients into taking immediate action.

Spam

Spam refers to unsolicited or unwanted emails, messages, or other digital communications sent in bulk. These messages often contain advertisements, phishing attempts, malware, or other malicious content. Spam can overload email systems, deceive users into revealing sensitive information, or infect systems with malware, making it a significant security concern.

Phishing

Phishing is a type of cyber attack where attackers impersonate legitimate entities, such as companies or individuals, to deceive recipients into revealing sensitive information, such as usernames, passwords, or financial details. Phishing attacks are typically carried out via email, but can also occur through other communication channels like text messages or social media.