Describe phishing.

What will be an ideal response?

One of the most common forms of social engineering is phishing, or sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information. The user is asked to respond to an e-mail or is directed to a Web site where they are instructed to update personal information, such as passwords, credit card numbers, Social Security numbers, bank account numbers, or other information for which the legitimate organization already has a record. However, the Web site is actually a fake and is set up to steal the user's information.

Computer Science & Information Technology

You might also like to view...

A computer with cache built in to the microprocessor plus memory built in to the processor packaging may have additional cache memory on the motherboard called

A) L3 cache B) L2 cache C) L1 cache D) L cache

Computer Science & Information Technology

A former Windows Vista user now has Windows 7 on their desktop. The user cannot locate the gadgets bar. How can the user put gadgets on the desktop?

A. Download the gadgets program from the Microsoft Downloads center. B. Change to the Vista desktop through the Personalization folder. C. Add gadgets to the desktop from the Control Panel. D. Add the gadgets from the Display folder.

Computer Science & Information Technology