COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Spoofing
|
|
Hijacking
|
|
Man-in-the-middle
|
|
DNS poisoning
|
Detailed explanation-1: -The most common forms of spoofing are: DNS server spoofing – Modifies a DNS server in order to redirect a domain name to a different IP address. It’s typically used to spread viruses. ARP spoofing – Links a perpetrator’s MAC address to a legitimate IP address through spoofed ARP messages.
Detailed explanation-2: -Eavesdropping Attacks In an eavesdropping attack, the attacker passively listens to network communications to gain access to private information, such as node identification numbers, routing updates, or application sensitive data.
Detailed explanation-3: -Database Software This helps in organizing data by creating and managing a database by storing, modifying, extracting, and searching for information within a database.