Select and research one of the many types of Deceptions and briefly provide a description, deployment (methods) and countermeasures. Denial-of-service attacks Trojan horses Phishing Etc. Conduct your own research and post a relevant summary of your findings. ( Stick to current data, not older than five years ). Use not more than three (3) references. .