<P> Privilege escalation describes a situation where an attacker with some level of restricted access is able to, without authorization, elevate their privileges or access level . For example, a standard computer user may be able to fool the system into giving them access to restricted data; or even to "become root" and have full unrestricted access to a system . </P> <P> Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details directly from users . Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one . Preying on a victim's trust, phishing can be classified as a form of social engineering . </P> <P> Clickjacking, also known as "UI redress attack" or "User Interface redress attack", is a malicious technique in which an attacker tricks a user into clicking on a button or link on another webpage while the user intended to click on the top level page . This is done using multiple transparent or opaque layers . The attacker is basically "hijacking" the clicks meant for the top level page and routing them to some other irrelevant page, most likely owned by someone else . A similar technique can be used to hijack keystrokes . Carefully drafting a combination of stylesheets, iframes, buttons and text boxes, a user can be led into believing that they are typing the password or other information on some authentic webpage while it is being channeled into an invisible frame controlled by the attacker . </P> <P> Social engineering aims to convince a user to disclose secrets such as passwords, card numbers, etc. by, for example, impersonating a bank, a contractor, or a customer . </P>

What is meant by using your computer and input devices in a safe manner