CURRENTLY ON AIR ⇒
  • JUZ A DAY (Daily Qur'an) - Local and International Recitors
    Wednesday, 12:05 pm - 1:00 pm
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 3

There are many kinds of attacks available to the dedicated hacker. These are among the most famous and frequent types of attacks.

1. Denial of service (DDoS):
This is an attack used to restrict the user’s access to the system resources by flooding the server with useless traffic. The botmaster (botmaster is the cyber-criminal/attacker who owns the botnet and responsible for its actions) commands all the bots to access a resource at the same time so that the resource gets hopelessly jammed up. Then, if a legitimate user wants to access that same resource, they will not be able to do so.

2. Malware attack:
This is a malicious program that disrupts or damages the computer. There are four main types of malware:
Keylogger: Keylogger records all the hits on the targeted keyboard. Most hackers use it to get passwords and account details.
Virus: A computer virus is a malicious code that replicates by copying itself to another program or document and changes how a computer works. The virus, such as the Melissa virus, requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator.
Worms: This is a standalone program that runs independently and infects the system. One of the more popular examples is W32.Alcra.F. The worm propagates itself through network share devices.
Trojan horse: This is a malicious code that takes over your computer. This code can damage or steal information from your computer.

3. Man in the middle:
Say, for example, you want to do an online transaction. You connect to your bank and conduct the payment. Simple, right?

Now, while you are doing a transaction, you have to enter the details of your card and the PIN. The cyber attacker spoofs you and monitors your transaction. As soon as you enter your details, he will have access to all of that information:

Tomorrow in sha Allah we will take a look at few other forms of cyber-attacks.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Your Body, Your Rules – Part 3

Your Body, Your Rules – Part 3

Small Steps to Better Health Your Body, Your Rules By now, you've heard the big picture. On Monday, we spoke about why small steps change everything. On Tuesday, we honoured World Health Day by connecting your personal health to global health. Today, we get practical....

read more
Your Health, Everyone`s Health – Part 2

Your Health, Everyone`s Health – Part 2

Small Steps to Better Health Your Health, Everyone`s Health Today, April 7th, people in nearly every country on earth are pausing to think about the same thing: health. Not just personal health — though that matters — but the health of communities, nations, and the...

read more
Why Small Steps Change Everything

Why Small Steps Change Everything

Small Steps to Better Health Why Small Steps Change Everything If you're like most people, the word "health" can feel heavy. It brings to mind things like strict diets, intense workouts, giving up foods you love, or making huge lifestyle changes that never seem to...

read more

Food Waste: The Hidden Crisis – Part 5

What a Waste! Food Waste: The Hidden Crisis This is our final day of Zero Waste Week, marking the International Day of Zero Waste. We've covered reducing, reusing, and recycling. Today, we tackle perhaps the most overlooked, most shocking, and most personal form of...

read more
Recycling: The Last Resort – Part 4

Recycling: The Last Resort – Part 4

What a Waste! Recycling: The Last Resort Earlier this week, on Monday the 30th of March, we observed the International Day of Zero Waste and are thus continuing our Zero Waste Week. We've talked about reducing — the most powerful tool we have. We've talked about...

read more
Reuse: Give Things a Second Life – Part 3

Reuse: Give Things a Second Life – Part 3

What a Waste! Reuse: Give Things a Second Life We are halfway through our Zero Waste Week, marking the International Day of Zero Waste. On Monday, we asked what waste is and why it matters. Yesterday, we talked about the most powerful tool in our toolkit: reducing...

read more

Subscribe to our Newsletter

0 Comments