COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
In computer security, a situation in which an unauthorized person is able to view another user’s display or keyboard to learn their password or other confidential information is known as:
A
Tailgating
B
Man-in-the-middle attack
C
Shoulder surfing
D
Brute-force attack
Explanation: 

Detailed explanation-1: -In computer security, shoulder surfing is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim’s shoulder.

Detailed explanation-2: -Social engineering is the art of manipulating people into performing actions or divulging confidential information. Social engineering applies to trickery used for information gathering or computer access and in most cases the attacker never comes face-to-face with the victim.

Detailed explanation-3: -Vishing. Vishing, otherwise known as “voice phishing", is the criminal practice of using social engineering over a telephone system to gain access to private personal and financial information from the public for the purpose of financial reward.

Detailed explanation-4: -A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a . Hacker.

Detailed explanation-5: -Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other forms of communication.

There is 1 question to complete.