Computer Science, asked by srao195, 8 months ago

Which of three (3) these approaches could be used by hackers as part of a Business Email Compromise attack?

Answers

Answered by laraibmukhtar55
6

Approaches could be used by hackers as part of a Business Email Compromise attack:

  • Once the hacker chooses which company to attack, they attack the company's email setting through a range of approaches that is social engineering, brute force, malware, key loggers, or spear phishing  
  • Business e-mail compromise occurs when hackers hack into a corporate e-mail account and mimic the real owner to deceive the company, its customers, partners, and/or staff into sending money or sensitive data to the attacker's account.

I hope it helped..

Similar questions