Question

_____________ involves the creation of false e-mails and/or websites that look legitimate but are designed to gain illegal access to a victim's personal information.

Answer

This answer is hidden. It contains 8 characters.