COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Blogging, Online Criminal Defamation and sedition
|
|
Online child pornography
|
|
Identity theft or Phishing
|
|
Computer fraud
|
Detailed explanation-1: -Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other forms of communication.
Detailed explanation-2: -Victims are tricked into giving up personal information such as their credit card data, phone number, mailing address, company information, etc. Criminals then use this information to steal the victim’s identity and commit further crimes using this stolen identity.
Detailed explanation-3: -Email phishing The stolen information or access may be used to steal money, install malware, or spear phish others within the target organization. Compromised streaming service accounts may also be sold on darknet markets.
Detailed explanation-4: -Email phishing. Most phishing attacks are sent by email. Spear phishing. There are two other, more sophisticated, types of phishing involving email. Whaling. Whaling attacks are even more targeted, taking aim at senior executives. Smishing and vishing. Angler phishing. 31-Jan-2023