CheeseLeaves
CheeseLeaves CheeseLeaves
  • 22-04-2019
  • Computers and Technology
contestada

(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ engineering.

Respuesta :

traveller135 traveller135
  • 23-04-2019

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

Answer Link

Otras preguntas

HELPPPPPPPPP i have the most trouble with math what’s the answer??
Please help me with this please please please
Help pleeeeeeeeeeeeeeeeeeeeeeeeaaaaaaaaaaaaaaaassssssssssseeeeeeeeeeeeeeeee
Which of the following expressions is equivalent to the one shown below (-3)^2*(-3)^9 A. (-3)^11 B. (-3)^7 C. (-3)^10 D. (-3)^18
What is the area of the two-dimensional cross section that is parallel to face ABC ? Enter your answer in the box. ft²
PLEASE HELP my dad's gonna beat me up
Which detail from the text presents MacGregor’s viewpoint? “So our tea set is really a three-piece social history of nineteenth-century Britain.” “It does unde
suppose you're given the formula P = 9m – 3n. If you know that n is 1⁄3 of m, how could you rewrite this formula? A. P = m B. P = 2(m – n)
solve the inequality
Can someone please help me with these two questions?