Answer the following questions: Always references are checked.
1) Discuss how social engineering techniques contribute to computer abuse and misuse.
2) Discuss how social media contributes to computer abuse and computer crimes.
3) Describe and discuss at least two of the hacking techniques mentioned in the chapter that you or family/friends have experienced. How did you solve the hacking attack?
4) Find from a non-chapter source an example of the use of computer hacking being used for embezzlement. Cite your source(s). Discuss the situation you found.