Assume that you have received an email with an attachment from you friends email id. You access
Fantastic news! We've Found the answer you've been seeking!
Question:
“We have identified a few threats which pose potential danger to our information systems. In order to address this, our information security team has decided to ensure proper credentials of all the employees. Please cooperate and complete this process immediately by clicking the given link.”
What kind of an attack this email is attempting? How should you respond to such emails?
Related Book For
Systems analysis and design
ISBN: 978-0136089162
8th Edition
Authors: kenneth e. kendall, julie e. kendall
Posted Date: