With computer access for work, education, and personal use reaching near universal saturation, and with many people logging time on more than one networked machine, a vast array of online computers are operated by largely untrained users. These operators' lack of network security awareness presents a large opportunity for hackers and cybercriminals to gain access to sensitive business and personal data. Ironically, it is not these users' computing inexperience that represents the vulnerability. A very small percentage of malicious computer attacks are caused by a "traditional" external attack. Instead of kicking in the door, so to speak, the perpetrators usually convince computer users to open it for them. Through targeted links and ads from dubious websites or fake emails to anonymous contacts made through instant messaging services or social networking sites, cybercriminals rely on people's trusting nature to provide them with the means to infect or gain access to the victims' computers. In some cases, creative criminals will even initiate their attack in the real world, placing advertisements or fake parking tickets on cars that ask the owners to visit a website for more information. The website usually contains invasive software that users then download to their computers.
Consider each of the following choices separately and select all that apply.According to the passage, which of the following are means that the passage suggests cybercriminals can use to illegitimately access another's computer?
(A)Engage in an external attack over a network
(B) Get users to click on a link contained in a deceitful email
(C) Use a seemingly innocuous object to get a person to voluntarily visit a specifically created attack site
With which of the following sentences would the author most likely agree?
(A) Since nearly everyone uses computers, the sheer number of computers in use makes the odds of any one computer being hacked too low to merit concern about security.
(B) One way to combat cybercrime is to become more suspicious of anonymous requests or messages sent over social networks.
(C) In order to prevent illegal access to data, only trained personnel should be allowed to use computers.
(D) If a cybercriminal is unable to trick users into giving access to their machines, the criminal will likely attack the users' machines directly.
(E) In order to protect their computers, people should refrain from using instant messaging services and social networks.