FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A HACKER

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What is a ‘zero day attack’?
A
General attack on network, by trial and error to obtain login names and passwords, to allow hacker to access network. Success is based oncomputer power and number ofcombinations tried = Brute Force
B
The day a security flaw is foundis called ____ ____ There is a race between hackers andcompany to exploit and fix.
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -A zero-day attack (also referred to as Day Zero) is an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of. 1 The software developer must rush to resolve the weakness as soon as it is discovered in order to limit the threat to software users.

Detailed explanation-2: -A zero-day is a security flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw.

Detailed explanation-3: -The term “zero-day” refers to the fact that the vendor or developer has only just learned of the flaw – which means they have “zero days” to fix it. A zero-day attack takes place when hackers exploit the flaw before developers have a chance to address it. Zero-day is sometimes written as 0-day.

Detailed explanation-4: -The terms “zero day exploit” and “zero day attack” are often used interchangeably. The basic difference is that the zero day attack infiltrates a corporate network, usually through a breach in email security, with a zero day exploit that steals or damages data or causes some other kind of disruptive malicious havoc.

There is 1 question to complete.