Cases
Think Before You Click
At the beginning of this chapter, you read about illicit activities of IT pirates and their methods for preying on victims, including both organizations and individuals around the globe. You saw that pirating aims to steal money and other resources by luring vulnerable potential victims with seemingly attractive offers of personal gain. Using the information presented in this chapter, you should now be able to answer the following questions.
Questions for Discussion
14-24. Think about recent spam e-mails and text messages that you have received. What kinds of information were the intruders seeking?
14-25. Were you able to identify the e-mails and messages to be “scams” before opening them, or did you discover their ...
Get Business Essentials, 12/e now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.