CURRENTLY ON AIR ⇒
  • Revival in Motion, Haafizah Rayhaanah Omar
    Thursday, 2:05 pm - 3:00 pm
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 3

There are many kinds of attacks available to the dedicated hacker. These are among the most famous and frequent types of attacks.

1. Denial of service (DDoS):
This is an attack used to restrict the user’s access to the system resources by flooding the server with useless traffic. The botmaster (botmaster is the cyber-criminal/attacker who owns the botnet and responsible for its actions) commands all the bots to access a resource at the same time so that the resource gets hopelessly jammed up. Then, if a legitimate user wants to access that same resource, they will not be able to do so.

2. Malware attack:
This is a malicious program that disrupts or damages the computer. There are four main types of malware:
Keylogger: Keylogger records all the hits on the targeted keyboard. Most hackers use it to get passwords and account details.
Virus: A computer virus is a malicious code that replicates by copying itself to another program or document and changes how a computer works. The virus, such as the Melissa virus, requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator.
Worms: This is a standalone program that runs independently and infects the system. One of the more popular examples is W32.Alcra.F. The worm propagates itself through network share devices.
Trojan horse: This is a malicious code that takes over your computer. This code can damage or steal information from your computer.

3. Man in the middle:
Say, for example, you want to do an online transaction. You connect to your bank and conduct the payment. Simple, right?

Now, while you are doing a transaction, you have to enter the details of your card and the PIN. The cyber attacker spoofs you and monitors your transaction. As soon as you enter your details, he will have access to all of that information:

Tomorrow in sha Allah we will take a look at few other forms of cyber-attacks.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Challenges Children Face

Challenges Children Face

Children face many different problems in today’s world. Some of these problems are unique to this generation, while others have been around for a long time. No matter what the problem is, it is essential that we, as parents and adults, do everything we can to help...

read more
Children`s Rights

Children`s Rights

There are about 2.3 billion children in the world, nearly a third of the total human population. Children are defined by law as people who are under the age of majority in their country, usually 18 years old. Whatever their age, all children have human rights, just as...

read more
Children are a Joy

Children are a Joy

“Kids Are a Joy and Life's Greatest Blessings” In this digital age, it’s easy to get caught up in the stressors of life. Between work and home responsibilities, financial obligations, and social media pressures, it often seems like we’re stretched to our limits. Most...

read more
World Children`s Day

World Children`s Day

Why the Day 20 November 2024 – World Children`s Day On World Children’s Day, we celebrate the youngest members of our human family. But today is also a moment to recognize the enormous challenges children face in our deeply divided, tumultuous and often violent world....

read more
How to Manage Year-End Fatigue in Your Team

How to Manage Year-End Fatigue in Your Team

Year-end fatigue is a reality for many of us and our teams. As the year starts to wind down, there’s a lot of pressure to deliver and meet deadlines. However, as we try to ramp things up and get things done, we can become even more exhausted and burnt out. Managers...

read more

Subscribe to our Newsletter

0 Comments