What Is The Definition, Typing And Protection Of Identity Theft? The attack results in messages intended for the host being sent to the malicious third party. We will also describe…