Discussion: Information Systems
In no less than 250 words, describe a type of email threat and how a hacker can use it to get sensitive information. How can a network administrator prevent this type of attach from happening?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.