COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Phishing
|
|
Privilege escalation
|
|
Backdoor access
|
|
Shoulder surfing
|
Detailed explanation-1: -A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as: Phishing.
Detailed explanation-2: -A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as: Phishing.
Detailed explanation-3: -Pharming is a social engineering technique in which the attacker executes malicious programs on a victim’s computer or server and when the victim enters any URL or domain name, it automatically redirects victim’s traffic to a website controlled by the attacker. This attack is also known as “Phishing without a Lure".
Detailed explanation-4: -Social engineering is the practice of manipulating people in order to obtain confidential or sensitive data.
Detailed explanation-5: -Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other forms of communication. Attackers will commonly use phishing emails to distribute malicious links or attachments that can perform a variety of functions.