BIT BY BYTE
Question 1 of 2
4 marks
Explain how phishing works and state two measures to protect against it.
Fake emails pretend to be from trusted sources to trick users into giving up passwords or clicking malicious links. Protection: user training to spot fakes; 2FA so stolen passwords alone aren't enough.
Phishing is a brute-force attack. Protection: longer passwords and lockout after failed attempts.
Phishing floods a server with fake requests. Protection: firewalls and load balancers.
Phishing uses SQL injection to read databases. Protection: input validation and parameterised queries.
Check Answer