Which of the following is not an example of social engineering?
◦ Developing phony websites with names and URL addresses very similar to legitimate websites in order to obtain confidential information.
◦ Setting up a computer that allows the user to use a next door neighbor's unsecured wireless network
◦ Using e-mail to request others into revealing their user IDs and passwords.
◦ Obtaining another person's credit card number without consent.