This storyboard does not have a description.
A computer is securely locked from others using it, however a hacker can still steal the information they want.
To gain information, a hacker is sending an encrypted email through to the locked computer.
The locked computer receives the email from an unknown person and the owner opens the attachment, unaware of what could happen.
Now the hacker has gained unauthorized access to the computer, after the owner has opened the email attachment. After stealing the information, he is able to gain money from the victims account.
Now the attachments of the emails sent have been open, the hacker can retrieve information ,such as card numbers and address, and can gain money from using these details.
Due to the hacker gaining card information, the victim has now been left with no money, as the hacker has been easily able to steal it, despite her computer being locked.
Explore Our Articles and Examples
Try Our Other Websites!
Photos for Class
– Search for School-Safe, Creative Commons Photos (It Even Cites for You!
– Easily Make and Share Great-Looking Rubrics
– Create Custom Nursery Art