MICROPROCESSOR AND MICROCONTROLLER

ICT

ARCHITECTURE OF 8085

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Types of cyberattacks:
A
frontal attack
B
passive attacks
C
brainstorm
D
active attacks
E
flank attack
Explanation: 

Detailed explanation-1: -Malware Attack. This is one of the most common types of cyberattacks. Phishing Attack. Password Attack. Man-in-the-Middle Attack. SQL Injection Attack. Denial-of-Service Attack. Insider Threat. Cryptojacking. More items •29-Mar-2023

Detailed explanation-2: -An attack on a secure communication protocol where the attacker transmits data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP).

Detailed explanation-3: -Active attacks attempt to modify, destroy or disrupt network or system resources, while passive attacks attempt to steal or monitor sensitive data. Both types of attacks can be dangerous, compromising confidentiality, integrity, and availability of systems and data, and leading to financial and reputational losses.

Detailed explanation-4: -Session Hijacking Attack. In a session hijacking attack, also known as session replay, playback attacks, or replay attacks, the threat actors copy the internet session ID information of the target. Message Modification Attack. Masquerade Attack. Denial-of-Service (DoS) Attack. 23-Dec-2022

Detailed explanation-5: -Malware. Denial-of-Service (DoS) Attacks. Phishing. Spoofing. Identity-Based Attacks. Code Injection Attacks. Supply Chain Attacks. Insider Threats. More items •13-Feb-2023

There is 1 question to complete.