Question

Malicious attacks can be random or directed. Explain in details ?with an examples

Malicious attacks can be random or directed. Explain in details ?with an examples

Homework Answers

Answer #1

Malicious Attacks :  A attack used to gain access of someone's else device without their knowledge .

i) It is used to get person's information , damage the device , or for some other financial gains.

ii) This attack occurs by installing malicious softwares (Viruses , Spyware, Ransomware and Trojan Horses ) on person's device.

iii) Most popular such attacks are by Ransomwar attack.

These attacks could be direct and random , when someone already aware of you and interesting in stealing some useful information then this attack would be direct .

Indirect Ways :

Malicious Websites : On visiting such websites a drive-by-download runs and gets downloaded into person's device which can exploits security hole.

Malvertising : Hackers purchase legitimate advertising space on legitimate websites and malicious code is embedded with in the ad . If anyone click over that ad either knowingly or by mistake malicious code get downloaded and create security thearts.

Man - In -The Middle :This is due to unsecured , poorly secured public Wifi- Router . The cyber criminals scan the router using special code looking for certain weakness such as default or poor password use . Then attacker can keep an eye over website user visits and intercept the message or information transmitted between the two such as passwords or payment card data.

Social Engineering malware attack : It uses spam phising via email , instant messages ,social media and so on by using human emotions (like dating sites link ,donation links etc) . The goal is to convinced the user to click over that link that host the malware.

These attacks could be prevented by taking safety measure as follows:

1.keep your software updated.

2.Back your file regularly

3.Scan excecutable file before running.

.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
What advantages can be achieved by the attacks using this type of cyber-attacks (DNS poisoning)? Explain.
What advantages can be achieved by the attacks using this type of cyber-attacks (DNS poisoning)? Explain.
Data Security Principles Q1.Describe whether passive attacks are harmful than active attacks or active attacks are...
Data Security Principles Q1.Describe whether passive attacks are harmful than active attacks or active attacks are harmful than passive attacks. You can write your own analysis in your own words. You may take examples and/or case studies.             Instructions: References are very important Describe more details as much as possible. Provide the relevant and exact answer. Describe the answer using diagrams wherever it necessary. You may use web, various text books, and journals for collecting the information.
"Python strings are immutable" Explain in details what is that mean. Provide examples of strings in...
"Python strings are immutable" Explain in details what is that mean. Provide examples of strings in Python and how it can be used
Computer programs with benign malicious intents are threat to computer and network security. Explain three ways...
Computer programs with benign malicious intents are threat to computer and network security. Explain three ways such undesired programs negatively affect its host or target computers. b) Render in an elaborative manner, some defensive measures that one can take to protect host or target computers from malicious computer programs. a) A notable attack recorded in the computing fraternity in October 2002 was successfully launched against the Internet’s 13 root servers, which act as the Internet’s ultimate authority with respect to...
Explain with full details and examples, what are the sources of ethics? What are the sources...
Explain with full details and examples, what are the sources of ethics? What are the sources of morals?
Explain the law of definite composition in DETAILS and give me examples to support your answer?
Explain the law of definite composition in DETAILS and give me examples to support your answer?
fully explain with details and examples please which liquid is least likely to mix with water...
fully explain with details and examples please which liquid is least likely to mix with water CH3F or CF4 ? And how come?
Can we apply capital budgeting techniques within the public sector? Explain in details using current event...
Can we apply capital budgeting techniques within the public sector? Explain in details using current event examples.
Can you generalize the characterization Eulerian graphs to directed graphs? If so explain with diagrams included...
Can you generalize the characterization Eulerian graphs to directed graphs? If so explain with diagrams included and if not explain why. Thanks!!
explain the methods of tranfer of sw and types of tranfer stations in details with examples.50marks...
explain the methods of tranfer of sw and types of tranfer stations in details with examples.50marks Note:Its for 50 marks i need 10page answer and own answer no internet answer r else i will downvote attempt only if you knownledge about the subject r else i il downvote and its for 50marks NOTE:no  wrong answer .i need own answer with diagram and all r else i il downvote.
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT