COMPUTER THREATS SECURITY
WHAT IS A HACKER
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
General attack on network, by trial and error to obtain login names and passwords, to allow hacker to access network. Success is based oncomputer power and number ofcombinations tried = Brute Force
|
|
The day a security flaw is foundis called ____ ____ There is a race between hackers andcompany to exploit and fix.
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -A zero-day attack (also referred to as Day Zero) is an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of. 1 The software developer must rush to resolve the weakness as soon as it is discovered in order to limit the threat to software users.
Detailed explanation-2: -A zero-day is a security flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw.
Detailed explanation-3: -The term “zero-day” refers to the fact that the vendor or developer has only just learned of the flaw – which means they have “zero days” to fix it. A zero-day attack takes place when hackers exploit the flaw before developers have a chance to address it. Zero-day is sometimes written as 0-day.
Detailed explanation-4: -The terms “zero day exploit” and “zero day attack” are often used interchangeably. The basic difference is that the zero day attack infiltrates a corporate network, usually through a breach in email security, with a zero day exploit that steals or damages data or causes some other kind of disruptive malicious havoc.