Assess the virtual or Internet-facilitated methods by which computer criminals steal an identity. Elaborate with examples of your own
What will be an ideal response?
The answer should include the following points:
• Phishing
i) Spoofing
ii) Pharming
iii) Redirectors
iv) Advance-fee fraud or 419 fraud
v) Phishing Trojans and spyware
vi) Floating windows
vii) Botnets
• Spyware and crimeware
• Keyloggers and password stealers
• Trojans
You might also like to view...
Which of the following statements best describes primary storage?
A. Stores data on a page/swap file on a disk B. The computer main memory that is volatile and directly addressable by the CPU C. Nonvolatile storage format that can store data, applications, and system code D. Computer memory that is accessed sequentially
The MaskFull property will return a value of ____ if the mask area of a masked textbox is not completely filled.
A. True B. False C. 0 D. ?1
Which of the following is not a layout available from the SmartArt gallery?
What will be an ideal response?
Pete's corporation has outsourced help desk services to a large provider. Management has published a procedure that requires all users, when receiving support, to call a special number. Users then need to enter the code provided to them by the help desk technician prior to allowing the technician to work on their PC. Which of the following does this procedure prevent?
A. Collusion B. Impersonation C. Pharming D. Transitive Access