COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which external threat is being described?"involves looking over a shoulder of someone to gain personal information. An example is a pin code from someone at a cash machine or a password of someone logging into a computer”
A
Pharming
B
Social Engineering
C
Shoulder surfing
D
Man-in-the-middle attacks
Explanation: 

Detailed explanation-1: -In computer security, shoulder surfing is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim’s shoulder.

Detailed explanation-2: -Shoulder surfing is using direct observation techniques, such as looking over someone’s shoulder, to get information.

Detailed explanation-3: -What is a Shoulder Surfing Attack? A shoulder surfing attack describes a situation where the attacker can physically view the device screen and keypad to obtain personal information. It is one of the few attack methods requiring the attacker to be physically close to the victim to succeed.

Detailed explanation-4: -I would Tell the person to leave immediately. I Proceed typing since the person couldn’t do any harm.

Detailed explanation-5: -Social engineering attacks such as shoulder surfing involve observing you use your mobile phone, laptop or credit card in order to steal your sensitive personal information.

There is 1 question to complete.