Cases

Think Before You Click

At the beginning of this chapter, you read about illicit activities of IT pirates and their methods for preying on victims, including both organizations and individuals around the globe. You saw that pirating aims to steal money and other resources by luring vulnerable potential victims with seemingly attractive offers of personal gain. Using the information presented in this chapter, you should now be able to answer the following questions.

Questions for Discussion

  1. 14-24. Think about recent spam e-mails and text messages that you have received. What kinds of information were the intruders seeking?

  2. 14-25. Were you able to identify the e-mails and messages to be “scams” before opening them, or did you discover their ...

Get Business Essentials, 12/e now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.