Question: - Gives a critical literature review and in-depth understanding of why phishing attack works. For some parts use tables and lists to make it more creative if needed.
Note: Use proper references. Also, do not use any offensive tools such as chartgpt, quilbolt, or others.