Which of the following security threats includes suspicious activity, such as reviewing someone’s screen display without permission?
A. Malware
B. Shoulder surfing
C. Phishing
D. Password cracking
Which of the following security threats includes suspicious activity, such as reviewing someone’s screen display without permission?
A. Malware
B. Shoulder surfing
C. Phishing
D. Password cracking