正在加载图片...
Figure 9-2: Malware · Attacks on Individuals Social engineering is tricking the victim into doing something against his or her interests Spam is unsolicited commercial e-mail Credit card number theft is performed by carders Identity theft is collecting enough data to impersonate the victim in large financial transactions Fraud involves get-rich-quick schemes, medical scams 88 Figure 9-2: Malware • Attacks on Individuals – Social engineering is tricking the victim into doing something against his or her interests – Spam is unsolicited commercial e-mail – Credit card number theft is performed by carders – Identity theft is collecting enough data to impersonate the victim in large financial transactions – Fraud involves get-rich-quick schemes, medical scams
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有