FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A HACKER

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What is the ‘Zero Day Attack’?
A
Where hackers and websites have a truce for a day
B
When a security flaw is found and websites have to fix it before hackers get in
C
Where all three types of hackers go on a illegal rampage for a day
D
Where an illegal hacker forces down one website
Explanation: 

Detailed explanation-1: -The term “zero-day” refers to the fact that the vendor or developer has only just learned of the flaw – which means they have “zero days” to fix it. A zero-day attack takes place when hackers exploit the flaw before developers have a chance to address it. Zero-day is sometimes written as 0-day.

Detailed explanation-2: -A zero-day (0day) exploit is a cyber attack targeting a software vulnerability which is unknown to the software vendor or to antivirus vendors. The attacker spots the software vulnerability before any parties interested in mitigating it, quickly creates an exploit, and uses it for an attack.

Detailed explanation-3: -A zero-day is a security flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw.

Detailed explanation-4: -A zero-day attack exploits zero-day vulnerabilities to cause damage or steal data from a system. The term “zero-day” refers to the number of days (zero) available to the software vendor to issue a fix for the unknown vulnerability before the attack.

Detailed explanation-5: -In most cases, hackers use code to exploit zero-day. Sometimes it is discovered by an individual when the program behaves suspiciously, or the developer himself may recognize the vulnerability. Attackers have found a new route by exploiting a zero-day vulnerability in Google’s Android mobile operating system.

There is 1 question to complete.