Many Internet browsers "lock the lock" on an encrypted web site so long as the digital certificate offered for this site matches the name for this web server. Explain how this could lead to a false sense of security in the case of a phishing attack
What will be an ideal response?
The name for the phishing website needs to match the digital certificate but
could be different from the name of the legitimate website being spoofed. Thus, the browser
can display a closed lock for a phishing website.
Computer Science & Information Technology
You might also like to view...
A CD-R is ____.
A. rewritable B. recordable C. read-only D. pre-recorded
Computer Science & Information Technology
What type of attribute determines how the operating system allows processes or users to perform some functions?
A. group B. collection C. container D. file
Computer Science & Information Technology