Identify the cybersecurity threats and briefly describe them
Refer to the case scenarios below, identify the cybersecurity threats and briefly describe them. (i) Su Lee received a call claiming to be from the authority that her money from the bank has been used in connection to a crime. She was threatened to cooperate else she would be investigated as well; She was asked to transfer her money to a different account, for the time being, send them the necessary details and the money will be returned onee the investigation was over. (ii) Josh is a jealous husband. He downloaded an app that disguised under a fake app name with suspicious access to messages, call logs and location. John use: this app to monitor the smartphone activities of his wife.

