1 | It is an attempt by a computer hacker to persuade a legitimate system user to reveal information, allowing the hacker to break through the system security |
2 | most common way hackers break into systems |
3 | the most common attack through the telephone |
4 | " If you give me your logon ID and password, I can fix it in a few minutes, you can change your password when I am done" |
5 | hacker takes advantage of the organization size - people do not know each other |
6 | if you receive a suspicious phone call, ask for a phone number and call the person back. |