CURRENTLY ON AIR ⇒
  • We can BKF, Ml Ibrahim Daya & Ml Muhammad Kara
    Saturday, 8:05 am - 8:30 am
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 3

There are many kinds of attacks available to the dedicated hacker. These are among the most famous and frequent types of attacks.

1. Denial of service (DDoS):
This is an attack used to restrict the user’s access to the system resources by flooding the server with useless traffic. The botmaster (botmaster is the cyber-criminal/attacker who owns the botnet and responsible for its actions) commands all the bots to access a resource at the same time so that the resource gets hopelessly jammed up. Then, if a legitimate user wants to access that same resource, they will not be able to do so.

2. Malware attack:
This is a malicious program that disrupts or damages the computer. There are four main types of malware:
Keylogger: Keylogger records all the hits on the targeted keyboard. Most hackers use it to get passwords and account details.
Virus: A computer virus is a malicious code that replicates by copying itself to another program or document and changes how a computer works. The virus, such as the Melissa virus, requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator.
Worms: This is a standalone program that runs independently and infects the system. One of the more popular examples is W32.Alcra.F. The worm propagates itself through network share devices.
Trojan horse: This is a malicious code that takes over your computer. This code can damage or steal information from your computer.

3. Man in the middle:
Say, for example, you want to do an online transaction. You connect to your bank and conduct the payment. Simple, right?

Now, while you are doing a transaction, you have to enter the details of your card and the PIN. The cyber attacker spoofs you and monitors your transaction. As soon as you enter your details, he will have access to all of that information:

Tomorrow in sha Allah we will take a look at few other forms of cyber-attacks.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

A Practice of Acknowledgement – Part 5

A Practice of Acknowledgement – Part 5

Deconstructing Gratitude Quick Recap - The Limits of Gratitude Gratitude is valuable, but it becomes harmful when it is forced, misused, or used to silence real feelings. Toxic gratitude appears when people are told to “just be grateful” in situations where they are...

read more
Limits of Gratitude – Part 4

Limits of Gratitude – Part 4

Deconstructing Gratitude Quick Recap - Gratitude as a Social Cohesive Gratitude is not just a personal feeling — it is a social force that strengthens relationships, teams, and communities. Expressing thanks builds trust, deepens empathy, reduces conflict, and...

read more
Gratitude as a Social Cohesive – Part 3

Gratitude as a Social Cohesive – Part 3

Deconstructing Gratitude Quick Recap - The Gratitude Deficit A gratitude deficit happens when envy, comparison, and resentment quietly take over our attention, making us focus more on what we lack than what we have. This isn’t intentional — it’s a natural response to...

read more
Gratitude Deficit – Part 2

Gratitude Deficit – Part 2

Deconstructing Gratitude Quick Recap - Gratitude for Adversity Gratitude isn’t only about appreciating good moments — it also includes finding meaning in difficult experiences. Gratitude for adversity means honestly acknowledging hardships and then recognising the...

read more
Gratitude for Adversity – Part 1

Gratitude for Adversity – Part 1

Deconstructing Gratitude Gratitude for Adversity How to find meaning and thankfulness in our hardest times When most people hear the word gratitude, they imagine writing down a few nice things that happened during the day — sunshine, good food, or a kind message from...

read more
The Spectrum of Advocacy – Part 4

The Spectrum of Advocacy – Part 4

The Conscientious Citizen Quick Recap - Information Hygiene in an Era of Misinformation In today’s fast-paced digital world, misinformation spreads quickly — often faster than the truth. Because of this, being a responsible consumer and sharer of information has...

read more

Subscribe to our Newsletter

0 Comments