Select and research one of the many types of Deceptions and briefly provide a description, deployment (methods) and countermeasures.

• Denial-of-service attacks

• Trojan horses

• Phishing

• Etc.

post a relevant summary of your findings. ( Stick to current data, not older than five years ). Use not more than three (3) references.