COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Pharming
|
|
Social Engineering
|
|
Shoulder surfing
|
|
Man-in-the-middle attacks
|
Detailed explanation-1: -In computer security, shoulder surfing is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim’s shoulder.
Detailed explanation-2: -Shoulder surfing is using direct observation techniques, such as looking over someone’s shoulder, to get information.
Detailed explanation-3: -What is a Shoulder Surfing Attack? A shoulder surfing attack describes a situation where the attacker can physically view the device screen and keypad to obtain personal information. It is one of the few attack methods requiring the attacker to be physically close to the victim to succeed.
Detailed explanation-4: -I would Tell the person to leave immediately. I Proceed typing since the person couldn’t do any harm.
Detailed explanation-5: -Social engineering attacks such as shoulder surfing involve observing you use your mobile phone, laptop or credit card in order to steal your sensitive personal information.