1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elden [556K]
3 years ago
15

EBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a d

igital camera on eBay. Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information. Of course, this email is not actually from eBay and as soon as you log in your information will be stolen. What type of information security breach would you consider this to be?
a. an insider
b. Dumpster diving
c. Social engineering
d. Phishing
Computers and Technology
1 answer:
Bond [772]3 years ago
7 0

Answer: d)Phishing

Explanation: Phishing is the activity that is used by the attackers or unauthorized parties to steal confidential information of individuals through emails, messages or calls.This activity is considered as cyber-crime as the unauthorized source present themselves as the legal and actual party to gain private information such as credit card details, personal details , etc.

The example mentioned in the question about eBay's security issue is also related with phishing  where the fraud mails are sent to the users to gain or steal their personal information.

Other options are incorrect because insider is a threat that happens in the organization or business field regarding the organizational data,dumpster diving is reviving data to execute an attack on operating system and social engineering is gaining personal information from an individual through manipulation .Thus, the correct option is option(d).

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

You might be interested in
Refer to Table 8-4. Consider the data above (in billions of dollars) for an economy: Gross domestic product (in billions of doll
Whitepunk [10]

If one uses the data above (in billions of dollars), the Gross domestic product (in billions of dollars) for this economy equals  $1,200.

<h3>What is the GDP about?</h3>

Note that:

GDP (Gross Domestic Product):

Thus it will be :

Consumption + Investment + Government expenditure + (Export - Import)

Which is:

GDP = 800 + 200 + 300 + (100 - 200)

GDP = $1200 billions

See full question below

Consumption expenditures $800

Investment expenditures 200

Government purchases 300

Exports 100

Imports 200

Wages 800

8) Refer to Table above. Consider the data above (in billions of dollars) for an economy: Gross domestic product (in billions of dollars) for this economy equals

A) $2,200.

B) $1,600.

C) $1,400.

D) $1,200.

Learn more about GDP from

brainly.com/question/1383956

#SPJ1

6 0
1 year ago
Choose 2 statements that correctly describe the time complexity of data structures with N data.
Softa [21]

The  statements that correctly describe the time complexity of data structures with N data are:

  • The average time complexity of the data lookup in a hash table is O(N).
  • The average time complexity of inserting data into a heap is O(logN)

<h3>What is time complexity of data structures?</h3>

Time Complexity of an algorithm is known to be the depiction of the amount of time needed by the algorithm to carry out to completion.

Note that The  statements that correctly describe the time complexity of data structures with N data are:

  • The average time complexity of the data lookup in a hash table is O(N).
  • The average time complexity of inserting data into a heap is O(logN)

Learn more about data from

brainly.com/question/17350816

#SPJ1

6 0
1 year ago
Javier develops sophisticated fashion websites. He has been asked by the owner of a leading fashion brand to create web content
saul85 [17]

Answer:

hyperlinks

Explanation:

Javier should use hyperlinks to show the users the possible choices for their clothing.  This is really a terrible question and not likely in any real world scenario.  Fashion is always forward thinking and on the cutting edge.  When was the last time you went to a fashion website and were left with only choices to click on a hyperlink?  As Tim Gun would say "Make it work."  If I were able I would include a hyperlink using the previous sentence as the clickable link with a URL reference to

https : //en.wikipedia.org/wiki/Tim_Gunn (spaces after https to make this link not get censored)

to illustrate the way to show that hyperlinks have no real application on modern fashion website.  But they would have great utility here inside the answers section.  But they also are cause for a securtity concern and may be killed by the moderators

7 0
3 years ago
(The Person, Student, Employee, Faculty, and Staff classes) Design a class named Person and its two subclasses named Student and
Mariulka [41]

Answer:

Explanation:

The following code is written in Java and creates all the classes as requested with their variables, and methods. Each extending to the Person class if needed. Due to technical difficulties I have attached the code as a txt file below, as well as a picture with the test output of calling the Staff class.

3 0
3 years ago
What theme could come from Piper's feelings and actions. Pixars short film piper
kaheart [24]

Answer:

Overcoming Fear

Explanation:

Given that a movie theme stimulates a universal human ordeal and at the same time, Piper is a short animated movie that was released in 2016. The fundamental idea of the movie is about a baby sandpiper who has to survive and conquer his anxiety and phobia of the water.

Hence, in this situation, the theme that could come from Piper's feelings and action is OVERCOMING FEAR

5 0
3 years ago
Other questions:
  • How to check what level you are in runescape?
    9·2 answers
  • Peripherals can be used to output information.<br> True<br> False
    9·2 answers
  • Which of the following is an advantage of batch processing?
    8·1 answer
  • Ann needs to share information about a new hiring policy. She needs to communicate this information to more than one hundred emp
    15·2 answers
  • The 8-bit ____ field is used by source network hosts and forwarding routers to distinguished classes or priorities in ipv6 packe
    11·1 answer
  • A=1/2h(a+b) solve for h
    6·1 answer
  • Ask the user to input a number less than 100. Print all the numbers from that number to 100.
    6·2 answers
  • Consider the following code:
    6·1 answer
  • If a person communicates indirectly and attaches little value to
    6·1 answer
  • What paradigm is this code based on? How do you know?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!