CURRENTLY ON AIR ⇒
  • Highlights of the Days Programmes
    Friday, 10:05 pm - 3:30 am
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 3

There are many kinds of attacks available to the dedicated hacker. These are among the most famous and frequent types of attacks.

1. Denial of service (DDoS):
This is an attack used to restrict the user’s access to the system resources by flooding the server with useless traffic. The botmaster (botmaster is the cyber-criminal/attacker who owns the botnet and responsible for its actions) commands all the bots to access a resource at the same time so that the resource gets hopelessly jammed up. Then, if a legitimate user wants to access that same resource, they will not be able to do so.

2. Malware attack:
This is a malicious program that disrupts or damages the computer. There are four main types of malware:
Keylogger: Keylogger records all the hits on the targeted keyboard. Most hackers use it to get passwords and account details.
Virus: A computer virus is a malicious code that replicates by copying itself to another program or document and changes how a computer works. The virus, such as the Melissa virus, requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator.
Worms: This is a standalone program that runs independently and infects the system. One of the more popular examples is W32.Alcra.F. The worm propagates itself through network share devices.
Trojan horse: This is a malicious code that takes over your computer. This code can damage or steal information from your computer.

3. Man in the middle:
Say, for example, you want to do an online transaction. You connect to your bank and conduct the payment. Simple, right?

Now, while you are doing a transaction, you have to enter the details of your card and the PIN. The cyber attacker spoofs you and monitors your transaction. As soon as you enter your details, he will have access to all of that information:

Tomorrow in sha Allah we will take a look at few other forms of cyber-attacks.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Youth and Technology

Youth and Technology

Quick Recap - "Turning Passion for Tech into Purpose" Youth can transform their love for technology into meaningful action by using digital skills to solve real-world problems, drive innovation, and create social impact in areas like education, health, and the...

read more
Youth and Technology

Youth and Technology

Quick Recap (Youth and Social Media) Social media offers youth powerful opportunities for self-expression, activism, learning, and entrepreneurship, enabling them to connect globally, share ideas, and even build careers. However, it also presents challenges like...

read more
Youth and Technology

Youth and Technology

Quick Recap AI offers youth powerful opportunities — from new careers and personalized learning to innovation and entrepreneurship — but access to skills, education, and technology must be expanded to ensure all young people can participate in and shape the AI-driven...

read more
Youth and Technology

Youth and Technology

Quick Recap World Youth Skills Day (15 July - today) emphasizes the importance of equipping young people with the skills needed for employment, decent work, and entrepreneurship. It highlights the urgency of youth skills development in the face of global challenges...

read more
World Youth Skills Day

World Youth Skills Day

History and Importance Introduction Every year on 15 July, the world comes together to observe World Youth Skills Day, a day that highlights the critical importance of equipping young people with the skills they need for employment, decent work, and entrepreneurship....

read more
Bilaadush Shaam

Bilaadush Shaam

Quick Recap Spiritually Chosen Land Shaam is a blessed and protected region in Islam, described by the Prophet ﷺ as being under the wings of the angels. It will remain a stronghold of faith during times of global tribulation and fitnah. Central Stage for End-Time...

read more

Subscribe to our Newsletter

0 Comments