before going straight to the question we need to understand what are these terms used for and where they come?
as today everything is digital, people are getting smarter day by day they prefer less work physically to get something. mall the business as go digital people are now getting everything just a click away. now when we are doing all the money matters digitally then we need something to secure them. now here comes the cybersecurity and all these terms are the sub-topics of the cybersecurity.
now let us explain each topic in detail:-
identity theft: it is a crime of obtaining the personal or financial information of another person to fulfill the there purpose, in another word it is a deliberate act of using someone else identity to do some financial transaction or to harm that person personally by misbehaving with others. they can commit many different types of crime by this act. types of identity theft include criminal, financial and child identity theft. in criminal, they used someone else identity to harm some other person physically or mentally. in financial the motive is very clear they just want money. in child identity theft, as the child don't know much so they can use them easily to harm others or even to harm them.
keylogger: as the name suggests they are the key "logger" which used to keep a trach on the user activities, they especially used to record the key you were pressing while doing work. they can be some software or hardware device now the question arises why it is harmful? let us suppose you are doing some financial transaction on some cafe, as you enter your password, the keylogger records the key's you were pressing hence some other person can do the transaction in behalf of you if they know the password. now it not only capture your password but also capture the URL you mostly visit, record the list of the application running in your system, take a screen capture of your activities periodically and mostly they automatically send your work report to the main key logger developer.
denial of service attack: this is known as DOS attack which is very much common in the cyber attack, here the perpetrator flooded the victim machine or computer with several servers to temporarily make the user think that the server is the breakdown and in the background, the perpetrator restore all the work the user was doing. as they create a sense of traffic server on the computer which makes impossible for the user to use the original site. as there is a different type of DOS attack like domain name system server attract, buffer overflow attack, DDOS attack, SYN attack etc.
Get Answers For Free
Most questions answered within 1 hours.