Many Internet browsers "lock the lock" on an encrypted web site so long as the digital certificate offered for this site matches the name for this web server. Explain how this could lead to a false sense of security in the case of a phishing attack

What will be an ideal response?

The name for the phishing website needs to match the digital certificate but
could be different from the name of the legitimate website being spoofed. Thus, the browser
can display a closed lock for a phishing website.

Computer Science & Information Technology

You might also like to view...

A CD-R is ____.

A. rewritable B. recordable C. read-only D. pre-recorded

Computer Science & Information Technology

What type of attribute determines how the operating system allows processes or users to perform some functions?

A. group B. collection C. container D. file

Computer Science & Information Technology