COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following is an example of active eavesdropping?
A
Spoofing
B
Zero-day attack
C
Spear phishing
D
MITM
Explanation: 

Detailed explanation-1: -One example of a MITM attack is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.

Detailed explanation-2: -A good example of the impact eavesdropping attacks can have is the increasing use of digital assistants like Amazon Alexa and Google Home. These assistants make users’ lives easier but are also easy for attackers to eavesdrop on and gain private information.

Detailed explanation-3: -For example, the cybercriminal will take login credentials captured from the fake website and use them on the actual one. From there, they could change the user’s password, steal vital financial information, or use the credentials for longer-term initiatives such as a company network or a more severe attack.

Detailed explanation-4: -A man-in-the-middle attack is a type of eavesdropping attack, where attackers interrupt an existing conversation or data transfer. After inserting themselves in the “middle” of the transfer, the attackers pretend to be both legitimate participants.

Detailed explanation-5: -The most common (and simplest) way of doing this is a passive attack in which an attacker makes free, malicious WiFi hotspots available to the public.

There is 1 question to complete.