Social Engineering Attacks Phishing Spear Phishing SMS Phishing Voice Phishing Whaling Elicitation Business Email Compromise Interrogation Impersonation Shoulder Surfing USB Key Drop Motication Techniques Authority Scarcity Social Proof Urgency Likeness Fear