COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Pharming
|
|
Social Engineering
|
|
Shoulder surfing
|
|
Man-in-the-middle attacks
|
Detailed explanation-1: -Someone sitting nearby could easily snoop and copy down the confidential data while looking over the victim’s shoulder. Furthermore, if the person is using a public wi-fi network, hackers can intercept private information shared over the network unless a VPN is utilized.
Detailed explanation-2: -A shoulder surfing attack describes a situation where the attacker can physically view the device screen and keypad to obtain personal information. It is one of the few attack methods requiring the attacker to be physically close to the victim to succeed.
Detailed explanation-3: -Nowadays, to defend against shoulder surfing attacks, one must be cognizant of their environment at all times. Threat actors don’t just shoulder surf by standing behind you at an ATM, but also use video cameras, binoculars, and other image magnification methods.
Detailed explanation-4: -To prevent shoulder surfing, it is best practice to use a privacy screen protector on your electronic device and to be aware of your surroundings when inputting sensitive information.