| List - I | List -II |
| (A) Phishing | (I) Code redirects user to fake website without user knowing |
| (B) Spyware | (II) Alters or deletes data |
| (C) Pharming | (III) Fake email replicates well known organization |
| (D) Viruses | (IV) Monitors information by monitoring key presses on a user's keyboard |