66.8k views
1 vote
Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as ________.

A) pretexting
B) spoofing
C) hacking
D) phishing

User LuMa
by
7.4k points

1 Answer

4 votes

Final answer:

The act of breaking into computers, servers, or networks to steal data is known as hacking. Hackers have a range of methods at their disposal, from technical exploits to social engineering techniques like phishing.

Step-by-step explanation:

The term for breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as C) hacking. Hackers use a range of techniques to achieve their goals, which can include everything from advanced cybersecurity breaches to simple social engineering tricks. For example, they may exploit vulnerabilities in software, use malware to gain unauthorized access, or deceive individuals into giving them access by pretending to be a trusted entity⁠—a method known as phishing. While pretexting involves creating a fabricated scenario to steal information and spoofing is about forging one's identity or the origin of a communication, hacking specifically refers to the act of breaking into systems to steal data or cause disruption.

User ElmerCat
by
7.5k points