Which statement would the author most likely AGREE with? a) Every phishing attack involves stealing the victim's identity to commit fraud. b) In a phishing attack, an attacker overpowers a victim with a stronger computer. c) In a spear phishing attack, the attacker erases the victim's identity. d) If a phishing attack is successful, users willingly give attackers sensitive data