Reference: Hassan, Mohamed. (2021). phishing-6573326 [Photograph]. Pixabay. https://pixabay.com/vectors/phishing-credentials-data-login-6573326/.
Reference: Muntashir, Fahim. (2021). HackNSU_S03 [Photograph]. Unsplash. https://unsplash.com/photos/a-man-using-a-laptop-computer-on-a-wooden-table-14JOIxmsOqA.
Reference: Hassan, Mohamed. (2022). phishing-6926470 [Photograph]. Pixabay. https://pixabay.com/vectors/phishing-fraud-hacking-online-fraud-6926470/.
Reference: s7akti. (2022). cybersecurity-6949298 [Photograph]. Pixabay. https://pixabay.com/vectors/cybersecurity-computer-security-6949298/.
Reference: Boitumelo. (2022). boitumelo-0_tcYADISt8 [Photograph]. Unsplash. https://unsplash.com/photos/a-desk-with-several-monitors-o_tcYADlSt8.
Reference: IBM Technology. (2023, June 2). Social Engineering – How Bad Guys Hack Users [Video]. YouTube. https://www.youtube.com/watch?v=uMkOphesrqI.