Question

Malicious attacks can be random or directed. Explain in details ?with an examples

Malicious attacks can be random or directed. Explain in details ?with an examples

Homework Answers

Answer #1

Malicious Attacks :  A attack used to gain access of someone's else device without their knowledge .

i) It is used to get person's information , damage the device , or for some other financial gains.

ii) This attack occurs by installing malicious softwares (Viruses , Spyware, Ransomware and Trojan Horses ) on person's device.

iii) Most popular such attacks are by Ransomwar attack.

These attacks could be direct and random , when someone already aware of you and interesting in stealing some useful information then this attack would be direct .

Indirect Ways :

Malicious Websites : On visiting such websites a drive-by-download runs and gets downloaded into person's device which can exploits security hole.

Malvertising : Hackers purchase legitimate advertising space on legitimate websites and malicious code is embedded with in the ad . If anyone click over that ad either knowingly or by mistake malicious code get downloaded and create security thearts.

Man - In -The Middle :This is due to unsecured , poorly secured public Wifi- Router . The cyber criminals scan the router using special code looking for certain weakness such as default or poor password use . Then attacker can keep an eye over website user visits and intercept the message or information transmitted between the two such as passwords or payment card data.

Social Engineering malware attack : It uses spam phising via email , instant messages ,social media and so on by using human emotions (like dating sites link ,donation links etc) . The goal is to convinced the user to click over that link that host the malware.

These attacks could be prevented by taking safety measure as follows:

1.keep your software updated.

2.Back your file regularly

3.Scan excecutable file before running.

.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
What advantages can be achieved by the attacks using this type of cyber-attacks (DNS poisoning)? Explain.
What advantages can be achieved by the attacks using this type of cyber-attacks (DNS poisoning)? Explain.
Computer programs with benign malicious intents are threat to computer and network security. Explain three ways...
Computer programs with benign malicious intents are threat to computer and network security. Explain three ways such undesired programs negatively affect its host or target computers. b) Render in an elaborative manner, some defensive measures that one can take to protect host or target computers from malicious computer programs. a) A notable attack recorded in the computing fraternity in October 2002 was successfully launched against the Internet’s 13 root servers, which act as the Internet’s ultimate authority with respect to...
Explain with full details and examples, what are the sources of ethics? What are the sources...
Explain with full details and examples, what are the sources of ethics? What are the sources of morals?
Explain the law of definite composition in DETAILS and give me examples to support your answer?
Explain the law of definite composition in DETAILS and give me examples to support your answer?
fully explain with details and examples please which liquid is least likely to mix with water...
fully explain with details and examples please which liquid is least likely to mix with water CH3F or CF4 ? And how come?
Can we apply capital budgeting techniques within the public sector? Explain in details using current event...
Can we apply capital budgeting techniques within the public sector? Explain in details using current event examples.
Can you generalize the characterization Eulerian graphs to directed graphs? If so explain with diagrams included...
Can you generalize the characterization Eulerian graphs to directed graphs? If so explain with diagrams included and if not explain why. Thanks!!
The occurrence of rust attacks along a gas pipeline can be modeled as a Poisson process...
The occurrence of rust attacks along a gas pipeline can be modeled as a Poisson process with intensity λ per kilometer. This means that the number of rust attacks per kilometer along the pipeline can be assumed to be Poisson distributed with expectation value λ. In the first instance, suppose that it is known that λ = 5. a) What is the probability of just two rust attacks in half a kilometer? What is the probability of more than two...
Explain in details how financial misconduct can cause actual financial losses
Explain in details how financial misconduct can cause actual financial losses
Can you explain the link between quality management practices and organisational culture? in details
Can you explain the link between quality management practices and organisational culture? in details