CURRENTLY ON AIR ⇒
  • Maktab On Air
    Thursday, 3:05 pm - 4:00 pm
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 3

There are many kinds of attacks available to the dedicated hacker. These are among the most famous and frequent types of attacks.

1. Denial of service (DDoS):
This is an attack used to restrict the user’s access to the system resources by flooding the server with useless traffic. The botmaster (botmaster is the cyber-criminal/attacker who owns the botnet and responsible for its actions) commands all the bots to access a resource at the same time so that the resource gets hopelessly jammed up. Then, if a legitimate user wants to access that same resource, they will not be able to do so.

2. Malware attack:
This is a malicious program that disrupts or damages the computer. There are four main types of malware:
Keylogger: Keylogger records all the hits on the targeted keyboard. Most hackers use it to get passwords and account details.
Virus: A computer virus is a malicious code that replicates by copying itself to another program or document and changes how a computer works. The virus, such as the Melissa virus, requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator.
Worms: This is a standalone program that runs independently and infects the system. One of the more popular examples is W32.Alcra.F. The worm propagates itself through network share devices.
Trojan horse: This is a malicious code that takes over your computer. This code can damage or steal information from your computer.

3. Man in the middle:
Say, for example, you want to do an online transaction. You connect to your bank and conduct the payment. Simple, right?

Now, while you are doing a transaction, you have to enter the details of your card and the PIN. The cyber attacker spoofs you and monitors your transaction. As soon as you enter your details, he will have access to all of that information:

Tomorrow in sha Allah we will take a look at few other forms of cyber-attacks.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Movement Matter – Part 4

Movement Matter – Part 4

Diabetes: Beyond the Needle Movement Matters: The Power of Everyday Activity Physical activity is one of the most influential and accessible ways to protect the body from developing Type 2 diabetes and to support overall health. Although exercise is often associated...

read more
The Diagnosis Dialogue – Part 3

The Diagnosis Dialogue – Part 3

Diabetes: Beyond the Needle The Diagnosis Dialogue - The Day Your Life Splits into 'Before' and 'After'. There are moments in life that cleave our personal timeline in two. The moment before you hear the words, and the moment after. A diagnosis of diabetes is one such...

read more
Understanding Diabetes – Part 2

Understanding Diabetes – Part 2

Diabetes: Beyond the Needle Understanding Diabetes: More Than Just Sugar When most people think of diabetes, they picture “high sugar.” But diabetes is far more complex — it affects the entire body, influences long-term health, and impacts millions of people...

read more
The Language of Prevention – Part 1

The Language of Prevention – Part 1

Diabetes: Beyond the Needle The Language of Prevention - Is Our Modern World Designed for Diabetes? When we talk about preventing Type 2 diabetes, the conversation typically begins and ends with a simple, time-worn prescription: "eat well and exercise." This advice,...

read more
Architecture of a Support System – Part 5

Architecture of a Support System – Part 5

The Ties That Bind Quick Recap - The Loneliness Epidemic The loneliness epidemic is not caused by social media alone, but by deeper societal changes that have weakened human connection. Traditional community structures — such as extended families, strong...

read more
The Loneliness Epidemic – Part 4

The Loneliness Epidemic – Part 4

The Ties That Bind Quick Recap – The Art of Disagreement Modern polarization has made disagreement feel threatening, as differing beliefs are often tied to identity and emotion rather than pure logic. When disagreements are treated as battles to win, people defend...

read more

Subscribe to our Newsletter

0 Comments