COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Spoofing
|
|
Dictionary attack
|
|
Social engineering
|
|
Trojan horse
|
|
Brute-force attack
|
Detailed explanation-1: -Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other forms of communication.
Detailed explanation-2: -In computer security, shoulder surfing is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim’s shoulder.
Detailed explanation-3: -The best protection against physical theft is to secure the laptops in place using a cable lock. Requiring strong passwords or using encryption might prevent unauthorized users from accessing data on the laptops, but these measures do not prevent physical theft.
Detailed explanation-4: -SMS-phishing uses social engineering to leverage your trust to steal your information but, unlike more traditional email-based scams, SMS-phishing utilizes text and mobile messaging services such as WhatsApp and iMessage, to defraud victims.