You receive an e-mail message from an online computer store offering you a new laptop at a very low price. You click the hyperlink in the message to open the Web page. The page requests your credit card details, and you enter your credit card number. After a few days, you find that more money has been charged than you specified and that you have not received the laptop. You realize that someone created a Web site that looks like a computer store but is not the official site.
Which one of the following terms refers to the type of attack described in this scenario?
Home
View
Design