COMPUTER ETHICS AND PROFESSIONALISM
ETHICAL AND SOCIAL ISSUES IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Phishing
|
|
Encryption
|
|
Watering hole attack
|
|
Cryptography
|
Detailed explanation-1: -Watering hole attacks–a type of social engineering attack–are also referred to as water-holing, a water hole attack or a strategically compromised website. Read more here about social engineering and other types of attacks.
Detailed explanation-2: -Man-in-the-Middle Attack. A Man-in-the-Middle Attack (MITM) is also known as an eavesdropping attack. In this attack, an attacker comes in between a two-party communication, i.e., the attacker hijacks the session between a client and host. By doing so, hackers steal and manipulate data.
Detailed explanation-3: -DoS and DDoS Attacks. A denial-of-service (DoS) attack is designed to overwhelm the resources of a system to the point where it is unable to reply to legitimate service requests. Phishing Attacks. Ransomware. SQL Injection Attack. Brute force attack.