Lot of attacks are present in the world which are phishing attack,DOS attack,malware,ransomware,keylogger attacks ,cross site scripting,buffer overflow like many attacks are present
software attacks are phishing,malware,ransomware,keylogger attacks
hardware attacks DOS,cross site scripting,buffer overflow
phishing is nothing but attacker sent some malicious link then when user click the link then automatically they capture the whole data of the user.the links like a original sites then user thought that it was real one...but it was created by attacker so he will capture the whole data from the user
malware:it was piece of software it can be installed in the victim's device without his assistance so then victim don't kno that software is installed with in the victim device.but attacker capture and monitor the device
ransomeware is a piece of attack no one able to remove the ransomware if it installed once.if we want get the system functionality back we need to pay some money like bitcoins then only we can able to open the system
these all are came from the trojan horse and worms which are the origins
keylogger is nothing but keylogger software can be installed victim's device then attacker listen each key stroke of the victim which is present beween hardwarw and software
DOS Attack:based on the user name lot of requests sent to the server by cross the limited requests server will be lost it service sometime
Get Answers For Free
Most questions answered within 1 hours.