CURRENTLY ON AIR ⇒
  • Panel Discussions
    Sunday, 11:05 am - 12:00 pm
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 3

There are many kinds of attacks available to the dedicated hacker. These are among the most famous and frequent types of attacks.

1. Denial of service (DDoS):
This is an attack used to restrict the user’s access to the system resources by flooding the server with useless traffic. The botmaster (botmaster is the cyber-criminal/attacker who owns the botnet and responsible for its actions) commands all the bots to access a resource at the same time so that the resource gets hopelessly jammed up. Then, if a legitimate user wants to access that same resource, they will not be able to do so.

2. Malware attack:
This is a malicious program that disrupts or damages the computer. There are four main types of malware:
Keylogger: Keylogger records all the hits on the targeted keyboard. Most hackers use it to get passwords and account details.
Virus: A computer virus is a malicious code that replicates by copying itself to another program or document and changes how a computer works. The virus, such as the Melissa virus, requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator.
Worms: This is a standalone program that runs independently and infects the system. One of the more popular examples is W32.Alcra.F. The worm propagates itself through network share devices.
Trojan horse: This is a malicious code that takes over your computer. This code can damage or steal information from your computer.

3. Man in the middle:
Say, for example, you want to do an online transaction. You connect to your bank and conduct the payment. Simple, right?

Now, while you are doing a transaction, you have to enter the details of your card and the PIN. The cyber attacker spoofs you and monitors your transaction. As soon as you enter your details, he will have access to all of that information:

Tomorrow in sha Allah we will take a look at few other forms of cyber-attacks.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Default Bias – Part 5

Default Bias – Part 5

Invisible Forces that Shape our Day Default Bias This is our final day exploring invisible forces that shape our day. We have covered routines, social contagion, the decoy effect, and the spotlight effect. Today we conclude with a force that is perhaps the most subtle...

read more
The Spotlight Effect – Part 4

The Spotlight Effect – Part 4

Invisible Forces that Shape our Day The Spotlight Effect We are nearly at the end of our week exploring invisible forces. So far we have covered routines, social contagion, and the decoy effect. Today we look at something that affects nearly every one of us,...

read more

The Decoy Effect – Part 3

Invisible Forces that Shape our Day The Decoy Effect So far this week we've talked about routines and social contagion — two invisible forces that shape our behaviour without us realising. Today we look at a third, and this one is particularly clever: The Decoy...

read more
Social Contagion – Part 2

Social Contagion – Part 2

Invisible Forces that Shape our Day Social Contagion Yesterday we spoke about routines — how our habits run on autopilot and shape our mornings without us deciding. Today we look at another invisible force: social contagion. Now, don't let the word contagion alarm...

read more
The Power of Routines – Part 1

The Power of Routines – Part 1

Invisible Forces that Shape our Day The Power of Routines Welcome to our drive time discussion. This week, we're exploring something fascinating — the invisible forces that shape our day without us even realising it. Today, we begin with The Power of Routines. Think...

read more
Stop Doing, Start Being – Part 5

Stop Doing, Start Being – Part 5

Small Steps for Better Health Stop Doing, Start Being You have made it through an entire week of small steps. You have thought about global health and your own health. You have moved your body. You have checked in with your mind. Today, we do something that sounds...

read more

Subscribe to our Newsletter

0 Comments