• Industrial espionage. Industrial espionage describes activities such as theft of trade
secrets, bribery, blackmail, and technological surveillance as well as spying on
commercial organizations and sometimes governments.
• Spam, phishing, and hoaxes. Spamming and phishing (see Figure 1.6), although
different, often go hand in hand. Spamming is the abuse of electronic
messaging systems to indiscriminately send unsolicited bulk messages, many
of which contain hoaxes or other undesirable contents such as links to
phishing sites. Phishing is the criminally fraudulent process of attempting
to acquire sensitive information such as usernames, passwords, and
credit-card details by masquerading as a trustworthy entity in an electronic
communication.
• Industrial espionage. Industrial espionage describes activities such as theft of tradesecrets, bribery, blackmail, and technological surveillance as well as spying oncommercial organizations and sometimes governments.• Spam, phishing, and hoaxes. Spamming and phishing (see Figure 1.6), althoughdifferent, often go hand in hand. Spamming is the abuse of electronicmessaging systems to indiscriminately send unsolicited bulk messages, manyof which contain hoaxes or other undesirable contents such as links tophishing sites. Phishing is the criminally fraudulent process of attemptingto acquire sensitive information such as usernames, passwords, andcredit-card details by masquerading as a trustworthy entity in an electroniccommunication.
การแปล กรุณารอสักครู่..
