What is phishing?
Accessing protected resource by the user
Deligating user access rights
Accquiring stray network packets
Acquiring sensitive information possing as trustworthy entity