COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND PROFESSIONALISM

ETHICAL AND SOCIAL ISSUES IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A cyberattack carried out by creating a fake website, or compromising/corrupting a real one, in order to gather information or data on visitors.
A
Phishing
B
Encryption
C
Watering hole attack
D
Cryptography
Explanation: 

Detailed explanation-1: -Watering hole attacks–a type of social engineering attack–are also referred to as water-holing, a water hole attack or a strategically compromised website. Read more here about social engineering and other types of attacks.

Detailed explanation-2: -Man-in-the-Middle Attack. A Man-in-the-Middle Attack (MITM) is also known as an eavesdropping attack. In this attack, an attacker comes in between a two-party communication, i.e., the attacker hijacks the session between a client and host. By doing so, hackers steal and manipulate data.

Detailed explanation-3: -DoS and DDoS Attacks. A denial-of-service (DoS) attack is designed to overwhelm the resources of a system to the point where it is unable to reply to legitimate service requests. Phishing Attacks. Ransomware. SQL Injection Attack. Brute force attack.

There is 1 question to complete.