Question

What is identity theft? What does a key logger do? What is a denial of service...

What is identity theft?


What does a key logger do?


What is a denial of service attack?

Homework Answers

Answer #1

before going straight to the question we need to understand what are these terms used for and where they come?

as today everything is digital, people are getting smarter day by day they prefer less work physically to get something. mall the business as go digital people are now getting everything just a click away. now when we are doing all the money matters digitally then we need something to secure them. now here comes the cybersecurity and all these terms are the sub-topics of the cybersecurity.

now let us explain each topic in detail:-

identity theft: it is a crime of obtaining the personal or financial information of another person to fulfill the there purpose, in another word it is a deliberate act of using someone else identity to do some financial transaction or to harm that person personally by misbehaving with others. they can commit many different types of crime by this act. types of identity theft include criminal, financial and child identity theft. in criminal, they used someone else identity to harm some other person physically or mentally. in financial the motive is very clear they just want money. in child identity theft, as the child don't know much so they can use them easily to harm others or even to harm them.

keylogger: as the name suggests they are the key "logger" which used to keep a trach on the user activities, they especially used to record the key you were pressing while doing work. they can be some software or hardware device now the question arises why it is harmful? let us suppose you are doing some financial transaction on some cafe, as you enter your password, the keylogger records the key's you were pressing hence some other person can do the transaction in behalf of you if they know the password. now it not only capture your password but also capture the URL you mostly visit, record the list of the application running in your system, take a screen capture of your activities periodically and mostly they automatically send your work report to the main key logger developer.

denial of service attack: this is known as DOS attack which is very much common in the cyber attack, here the perpetrator flooded the victim machine or computer with several servers to temporarily make the user think that the server is the breakdown and in the background, the perpetrator restore all the work the user was doing. as they create a sense of traffic server on the computer which makes impossible for the user to use the original site. as there is a different type of DOS attack like domain name system server attract, buffer overflow attack, DDOS attack, SYN attack etc.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
In 2001 data showed that 55% of consumer complaints were for identity theft. According to the...
In 2001 data showed that 55% of consumer complaints were for identity theft. According to the            February 2008 Federal Trade Commission report on consumer fraud and identity theft,            Arkansas had 1,601 complaints of identity theft out of 3,482 consumer complaints ("Consumer            fraud and," 2008). Does the data show that the proportion of consumers complaints about            identity theft has decreased? Test at the 1% level. Identify the sample statistic, the test            statistic, and the p-value along with your conclusion.
Assess ways a healthcare consumer can guard against medical identity theft. Have you taken or do...
Assess ways a healthcare consumer can guard against medical identity theft. Have you taken or do you take steps to guard yourself against medical identity theft? Write a brief plan of how you do or will take these steps for you and your family.
According to the February 2008 Federal Trade Commission report on consumer fraud and identity theft, 23%...
According to the February 2008 Federal Trade Commission report on consumer fraud and identity theft, 23% of all complaints in 2007 were for identity theft. In that year, Alaska had 321 complaints of identity theft out of 1,432 consumer complaints ("Consumer fraud and," 2008). Does this data provide enough evidence to show that Alaska had a lower proportion of identity theft than 23%? Test at the 5% level.
According to the February 2008 Federal Trade Commission report on consumer fraud and identity theft, 23%...
According to the February 2008 Federal Trade Commission report on consumer fraud and identity theft, 23% of all complaints in 2007 were for identity theft. In that year, Alaska had 321 complaints of identity theft out of 1,432 consumer complaints ("Consumer fraud and," 2008). Does this data provide enough evidence to show that Alaska had a lower proportion of identity theft than 23%? State the random variable, population parameter, and hypotheses.
According to the February 2008 Federal Trade Commission report on consumer fraud and identity theft, 23%...
According to the February 2008 Federal Trade Commission report on consumer fraud and identity theft, 23% of all complaints in 2007 were for identity theft. In that year, Alaska had 321 complaints of identity theft out of 1,432 consumer complaints ("Consumer fraud and," 2008). Does this data provide enough evidence to show that Alaska had a lower proportion of identity theft than 23%? State the type I and type II errors in this case, consequences of each error type for...
Identity theft has become a serious and growing problem in the United States. Why do you...
Identity theft has become a serious and growing problem in the United States. Why do you think it is? How do you feel we can prevent it? Feel free to share your personal experience with this, if you have any. If you have personal experience, discuss how it affected you and if anything has changed for you since the theft.
how can a website distinguish between lack of capacity and a denial-of-service attack? for example, websites...
how can a website distinguish between lack of capacity and a denial-of-service attack? for example, websites often experience a tremendous increase in volume of traffic night after an advertisement with site's url in shown on television during a broadcast of a popular sporting event. that spike in usage is the result of normal access that happens to occur at the same time. how can a site determine that high traffic is reasonable?
5.33 Suppose a denial-of-service attack shuts down two dozen major websites, including retailers, stock brokerages, and...
5.33 Suppose a denial-of-service attack shuts down two dozen major websites, including retailers, stock brokerages, and large corporate entertainment and information sites, for several hours. The attack is traced to one of the following perpetrators. Do you think different penalties are appropriate, depending on which it is? Explain why. If you would impose different penalties, how would they differ? (a) A foreign terrorist who launched the attack to cause billions of dollars in damage to the U.S. economy. (b) An...
In what two ways are computers used in the commission of crimes or misdeeds? What constitutes...
In what two ways are computers used in the commission of crimes or misdeeds? What constitutes a computer crime? How does a denial-of-service attack work? What is the effect of a virus hoax?
1. Consumers’ using cash in transactions more frequently in response to an increase in identity theft...
1. Consumers’ using cash in transactions more frequently in response to an increase in identity theft For each shock, Use the Keynesian Cross and Theory of Liquidity preference to explain the shifts in IS and LM curve Use the IS-LM diagram to determine the effects on Y and r. Figure out what happens to C, I, and the unemployment rate. Your explanations must include graphs with appropriate labels for axes and curves.
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT