Compare and contrast Identity Theft to Dumpster Diving in terms of risk to individuals and businesses.
Name and briefly discuss the broad categories that phishing is split into.
Describe an investigation/sting operation that targeted phishing.
Make sure that you properly support your post and cite the e-text or valid sources.