COMPUTER THREATS SECURITY
WHAT IS PHISHING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Using phishing attacks to get pharmaceuticals
|
|
Spamming farmers with unwanted agricultural products
|
|
Harvesting information via free downloadable game
|
|
Putting malicious scripts onto network servers
|
Detailed explanation-1: -Pharming is like phishing in that it is a threat that tricks users into divulging private information, but instead of relying on email as the attack vector, pharming uses malicious code executed on the victim’s device to redirect to an attacker-controlled website.
Detailed explanation-2: -Malicious scripts are fragments of code that have been modified by threat actors for nefarious purposes. Cyber threat actors hide them in legitimate websites, third-party scripts, and other places to compromise the security of client-side web applications and webpages.
Detailed explanation-3: -An example of pharming would be if a user would open their browser and enter the web address of their bank in order to complete a transaction in online banking. However, the user is redirected to a fraudulent site that looks like the bank’s website.
Detailed explanation-4: -Malicious code examples include backdoor attacks, scripting attacks, worms, trojan horse and spyware.