It is an attempt by a computer hacker to persuade a legitimate system user to reveal information, allowing the hacker to break through the system security |
most common way hackers break into systems |
the most common attack through the telephone |
" If you give me your logon ID and password, I can fix it in a few minutes, you can change your password when I am done" |
hacker takes advantage of the organization size - people do not know each other |
if you receive a suspicious phone call, ask for a phone number and call the person back. |