Capture.PNG
Document Details
Uploaded by jlopez59#
Tags
Related
- Certified Cybersecurity Technician Information Security Attacks Exam 212-82 PDF
- IoT Security - Introduction to IoT Security PDF
- Computer Hackers PDF
- NPTEL Online Certification Courses: Ethical Hacking Lecture Notes PDF
- Cybersecurity Assessment PDF
- Ethics for the Information Age Ninth Edition Chapter 7 PDF
Full Transcript
# User Education (2 of 4) Hackers might try to obtain information or trick people into giving information by: - Dumpster diving - Looking for useful information in someone's trash - Phishing, spear phishing, impersonation, and spoofing - Phishing is a type of identity theft where the sender...
# User Education (2 of 4) Hackers might try to obtain information or trick people into giving information by: - Dumpster diving - Looking for useful information in someone's trash - Phishing, spear phishing, impersonation, and spoofing - Phishing is a type of identity theft where the sender of an email scams you into responding with personal data - Spear phishing is a hoax email that appears to come from companies you already do business with - Spoofing is where the scam artist makes both the email and the website look like the real thing - An email message might contain a link that leads to a malicious script