Demystifying Technology without Jargon

  1. API
  2. Binary Code
  3. Cache
  4. Compiling
  5. Cookie
  6. Database
  7. Defragmenting
  8. Exploit
  9. IP Address
  10. Open Source
  11. Phishing
  12. Router
  13. Server
  14. VPN
  15. Web Browser


Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.


Phishing is Fishing in a Lake.

When you're fishing in a lake, you're trying to catch a fish. When you're phishing on the internet, you're trying to "catch" a victim's personal information. To catch a fish, you must use a bait to lure the fish to your hook. To bait a victim, you send a fake email impersonating one of many legitimate websites the victim might be familiar with. The fish believes that the bait is a normal meal. The victim believes the email is a legitimate request to provide their username and password, or even other sensitive information. The result of both can be disastrous.


Hear a term that you wish had a metaphor? Tweet us, post it to Facebook, or, if you're feeling geeky, open a new task on Github!

Created by Clint Andrew Hall, licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.