TopMyGrade

GCSE/Computer Science/AQA

CS6.2Social engineering: blagging, phishing, pharming, shoulder surfing; how the attacker exploits human behaviour

Notes

Social engineering

Social engineering is the art of manipulating people into giving up confidential information, clicking malicious links, or taking actions that bypass technical security. It's effective because it targets humans, not systems — and humans can be tired, polite, fearful or just curious.

AQA highlights four techniques: blagging, phishing, pharming and shoulder surfing.

1. Blagging (pretexting)

The attacker invents a pretext — a plausible scenario — and uses it to extract information.

Example: a phone call claiming to be from your bank asking you to confirm your card number "to verify a suspicious transaction". The "bank" is actually a scammer.

Common pretexts:

  • IT support needing your password "to fix" a problem.
  • HMRC threatening prosecution unless you pay.
  • A delivery driver claiming you missed a parcel and need to confirm details.

Defence: never give credentials to someone who contacted you. Hang up and call back on the official number.

2. Phishing

Sending bulk fake emails that appear to come from a trusted organisation, tricking recipients into clicking malicious links or downloading malware.

Signs of a phishing email:

  • Urgent language: "Your account will be locked!".
  • Generic greeting: "Dear customer".
  • Suspicious sender address: security@bnk.co.example.
  • Links that don't match the displayed URL (hover before clicking).
  • Spelling and grammar errors.
  • Unexpected attachments.

Spear phishing is targeted phishing — the attacker has researched the victim and personalises the message.

Whaling is spear phishing aimed at executives.

Defence: don't click links in unexpected emails; type the address by hand; verify with the company.

3. Pharming

Redirects a victim from a legitimate website to a fake one, even if they typed the correct URL. Achieved by:

  • Compromising the victim's local machine (e.g. modifying the hosts file).
  • Compromising DNS so the legitimate name resolves to the attacker's IP.

The fake site looks identical and harvests credentials.

Defence: HTTPS / certificate checks (the padlock should be present and the certificate valid for the right domain), DNS security, antivirus, browser warnings.

4. Shoulder surfing

Watching someone's screen, keyboard or PIN entry over their shoulder in person. Low-tech but effective in cafes, on trains, at ATMs.

Defence: privacy screens, awareness of surroundings, shielding the keypad, not entering passwords in public.

Why social engineering works

  • Authority — people obey "the boss" or "the bank".
  • Urgency — "Act now!" overrides careful thinking.
  • Reciprocity — "I'm helping you, so help me".
  • Social proof — "Everyone else has confirmed".
  • Curiosity — "Look at this picture of you?".
  • Fear — "Your account is compromised!".

Even technically savvy users fall for well-crafted attacks, especially when tired or distracted.

Worked exampleWorked example — phishing email

From: security@netfllix-billing.com
To: a.smith@example.com
Subject: URGENT: Your subscription will be cancelled

Dear customer,

We were unable to process your payment. Click below to update your card details.
[Click here]

Red flags: misspelled domain ("netfllix"), generic greeting, urgent tone, link to update credentials.

Common mistakesPitfalls

  1. Believing only "stupid" people fall for phishing. Attacks target everyone, including IT professionals.
  2. Treating HTTPS as proof of legitimacy. A padlock means encrypted, not honest.
  3. Calling all manipulation "phishing". Phishing is email specifically; broader social engineering covers calls, in-person, etc.
  4. Forgetting shoulder surfing in public. Cafes and trains are full of casual data leaks.
  5. Failing to report. Many attacks succeed because the victim doesn't tell IT — letting the attacker keep going.

Defending against social engineering

  • User education — train staff to recognise common patterns.
  • Verification procedures — require call-backs, confirmation by another channel.
  • Reporting culture — make it easy and shame-free to report suspected attacks.
  • Technical defences — email filtering, DMARC, browser warnings.
  • Reduce attackable surface — limit who has access to sensitive data.

Try thisQuick check

Identify the technique:

  • "Hi, this is IT — I just need your password to install the patch": blagging.
  • A bulk email pretending to be from PayPal: phishing.
  • Typing your bank URL but landing on a fake site: pharming.
  • Reading your PIN at the ATM from a distance: shoulder surfing.

AI-generated · claude-opus-4-7 · v3-deep-computer-science

Practice questions

Try each before peeking at the worked solution.

  1. Question 13 marks

    Define blagging

    Define blagging (pretexting) and give one example.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  2. Question 23 marks

    Phishing red flags

    State three signs that an email may be a phishing attempt.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  3. Question 34 marks

    Pharming description

    Describe how a pharming attack works.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  4. Question 42 marks

    Shoulder surfing

    Describe shoulder surfing and one defence against it.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  5. Question 52 marks

    Why social engineering works

    Explain two psychological reasons social engineering attacks succeed.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  6. Question 62 marks

    Phishing vs pharming

    State two differences between phishing and pharming.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  7. Question 73 marks

    Defence strategy

    A school wants to defend staff against social engineering attacks. Suggest three measures.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

Flashcards

CS6.2 — Social engineering

12-card SR deck for AQA GCSE Computer Science topic CS6.2

12 cards · spaced repetition (SM-2)