CheeseLeaves
CheeseLeaves CheeseLeaves
  • 22-04-2019
  • Computers and Technology
contestada

(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ engineering.

Respuesta :

traveller135 traveller135
  • 23-04-2019

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

Answer Link

Otras preguntas

homophones for the words insignificant and small.  has to be 5 letters
A drawing of a surfboard in a catalog shows it's length as 8 4/9 inches. Find the actual length of the surfboard if 1/2 inch length on the drawing corresponds t
Which mathematical sentence most accurately expresses the information in the problem below? Crystal has 100 compact discs that she wants to put into boxes each
A rectangle is 5 units long. The rectangle is also 3 units wide. What is its perimeter?
analogies, allow:permit::find:
How do I solve this problem 7x<14 and 1-x<4
Why do the oceans play such a large part in the water cycle
the kind of lake that formed when a river meanders
the school marching band has 36 members. the band director wants to arrange the band members into a square formation. how many band members should be in each ro
If a yield sign is a regular polygon what is the measure of each angle