COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
THEY PLAY MINECRAFT
|
|
They steal cars
|
|
They steal computer software
|
|
They steal your information
|
Detailed explanation-1: -Many online services require users to fill in personal details such as full name, home address and credit card number. Criminals steal this data from online accounts to commit identity theft, such as using the victim’s credit card or taking loans in their name.
Detailed explanation-2: -Hackers create malicious apps that can siphon personal information from your device when you download or use the apps. Cybercriminals set up fake public Wi-Fi networks to lure and redirect people to malicious websites where they can steal personal information.
Detailed explanation-3: -Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. Hackers are motivated by personal gain, to make a statement, or just because they can.
Detailed explanation-4: -Using a fake identity and various psychological tricks, hackers can deceive you into disclosing personal or financial information. They may rely on phishing scams, spam emails or instant messages, or even fake websites to achieve this. Hackers use different ways to obtain passwords.
Detailed explanation-5: -Using yet another IoT search engine like Shodan and ZoomEye, hackers can find devices connected to the internet, geolocation, port/operating system, services/host, and IP address. They can also check if those systems use default login passwords.