COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
“The attacker impersonates a legitimate source to the user” is referred to as:
A
Spoofing
B
Phishing
C
Spam
D
Phreaking
Explanation: 

Detailed explanation-1: -Phishing is a technique used by fraudsters to steal people’s data by impersonating companies or organizations, conveying a false sense of trust and thus obtaining sensitive information from users.

Detailed explanation-2: -Spoofing is a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information. Spoofing attacks copy and exploit the identity of your contacts, the look of well-known brands, or the addresses of trusted websites.

There is 1 question to complete.