List - I | List -II |
(A) Phishing | (I) Code redirects user to fake website without user knowing |
(B) Spyware | (II) Alters or deletes data |
(C) Pharming | (III) Fake email replicates well known organization |
(D) Viruses | (IV) Monitors information by monitoring key presses on a user's keyboard |