These terms cover deceptive tactics that target people, not just systems. Most school security incidents start with this category.
Phishing
Phishing is a fraudulent message designed to trick someone into clicking a malicious link, sharing credentials, or sending sensitive data.
Why it matters for schools: K-12 staff and students get frequent email attacks, and one click can expose student records or district systems.
Spear Phishing
Spear phishing is a targeted phishing attack customized for a specific person, role, school, or district.
Why it matters for schools: Personalized messages are harder to spot and often target principals, payroll staff, and IT administrators.
Whaling
Whaling is spear phishing aimed at high-value leaders such as superintendents, CFOs, and executive administrators.
Why it matters for schools: A successful whaling attack can lead to large wire fraud losses or broad access to district systems.
Smishing
Smishing is phishing delivered through SMS or text messaging instead of email.
Why it matters for schools: Staff often trust text messages more than email, making mobile attacks a growing school risk.
Vishing
Vishing is voice phishing where attackers use phone calls or voicemail to impersonate trusted contacts.
Why it matters for schools: School front offices and help desks are common targets because they process urgent requests by phone.
Quishing
Quishing is phishing that uses QR codes to send users to malicious sites or fake login pages.
Why it matters for schools: QR codes on posters, emails, and handouts are common in schools, so users may scan without verifying.
Spoofing
Spoofing is falsifying an identity such as an email sender, website, phone number, or domain to appear legitimate.
Why it matters for schools: Impersonation makes fake messages look like district leadership, vendors, or trusted school systems.
Social Engineering
Social engineering is manipulating people into bypassing security controls by exploiting trust, urgency, or fear.
Why it matters for schools: Even strong technical defenses fail when users are pressured into unsafe actions.
Pretexting
Pretexting is an attack where someone invents a believable story to obtain data, access, or action.
Why it matters for schools: Attackers can pose as parents, vendors, or auditors to request sensitive student or payroll information.
Baiting
Baiting is a social engineering method that offers something tempting, such as a free download or USB drive, to trigger unsafe behavior.
Why it matters for schools: Curiosity-driven clicks or device use can introduce malware into school networks.
Tailgating
Tailgating is physically following an authorized person into a restricted area without proper access credentials.
Why it matters for schools: Physical access can expose servers, admin offices, and records systems in school buildings.
BEC (Business Email Compromise)
BEC is a fraud scheme where attackers impersonate trusted accounts to request payments, gift cards, or sensitive data.
Why it matters for schools: District finance teams and principals are frequent BEC targets, and losses can be immediate and severe.
Phishing Simulation
Phishing simulation is a controlled training exercise that sends realistic test messages to measure and improve user behavior.
Why it matters for schools: Schools use simulations to reduce risky click behavior and build practical detection habits over time.