Submitted by: Submitted by tinlun
Views: 440
Words: 3136
Pages: 13
Category: Science and Technology
Date Submitted: 04/13/2012 02:43 PM
|Chapter9 |1. |__________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like|
| | |they are from legitimate companies but are, in fact, fake. |
| | |a. |
| | |Phishing |
| | | |
| | |b. |
| | |Pretexting |
| | | |
| | |c. |
| | |Bluesnarfing |
| | | |
| | |d. |
| | |Social...