Which of the following sequence of events best describes an online intrusion?
Malware enters the device, and then opens a backdoor, which opens a communications link on the device that a hacker can exploit.
algorithm
Spear phishing
advance fee fraud