COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Passive
|
|
Indirect
|
|
Active
|
|
Random
|
Detailed explanation-1: -Passive: Attackers gain access to a network and can monitor or steal sensitive information, but without making any change to the data, leaving it intact. Active: Attackers not only gain unauthorized access but also modify data, either deleting, encrypting or otherwise harming it.
Detailed explanation-2: -Active Network Threats: Activities such as Denial of Service (DoS) attacks and SQL injection attacks where the attacker is attempting to execute commands to disrupt the network’s normal operation.
Detailed explanation-3: -Threats can be classified into four different categories; direct, indirect, veiled, conditional.
Detailed explanation-4: -Examples of active attacks include man-in-the-middle (MitM), impersonation, and session hijacking.