Which of the following describes the phishing method of information security crime?
A.
physically interacting with the victim and using her computer when she is not looking
B.
rifling through recycling bins to find account information
C.
pretending to be someone else when asking for information
D.
all of these