fbpx
CURRENTLY ON AIR ⇒
  • JUZ/PARA A DAY
    Sat, 12:05 pm - 1:00 pm
    [ - ]

feedback@radioislam.org.za

Radio Islam Logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 3

Dec 01, 2021

There are many kinds of attacks available to the dedicated hacker. These are among the most famous and frequent types of attacks.

1. Denial of service (DDoS):
This is an attack used to restrict the user’s access to the system resources by flooding the server with useless traffic. The botmaster (botmaster is the cyber-criminal/attacker who owns the botnet and responsible for its actions) commands all the bots to access a resource at the same time so that the resource gets hopelessly jammed up. Then, if a legitimate user wants to access that same resource, they will not be able to do so.

2. Malware attack:
This is a malicious program that disrupts or damages the computer. There are four main types of malware:
Keylogger: Keylogger records all the hits on the targeted keyboard. Most hackers use it to get passwords and account details.
Virus: A computer virus is a malicious code that replicates by copying itself to another program or document and changes how a computer works. The virus, such as the Melissa virus, requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator.
Worms: This is a standalone program that runs independently and infects the system. One of the more popular examples is W32.Alcra.F. The worm propagates itself through network share devices.
Trojan horse: This is a malicious code that takes over your computer. This code can damage or steal information from your computer.

3. Man in the middle:
Say, for example, you want to do an online transaction. You connect to your bank and conduct the payment. Simple, right?

Now, while you are doing a transaction, you have to enter the details of your card and the PIN. The cyber attacker spoofs you and monitors your transaction. As soon as you enter your details, he will have access to all of that information:

Tomorrow in sha Allah we will take a look at few other forms of cyber-attacks.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Points to consider – Part 5

Points to consider – Part 5

Important Points for a Muslim to Consider in Summer So many of us complain about how hot it is and how long the days are, but unfortunately there are very few of us who actually take benefit and use these hot and long days to our advantage. Here are a few important...

read more
Healthy foods for summer – part 4

Healthy foods for summer – part 4

Healthy summer foods to beat the heat and boost health Summer brings with it fresh fruits and vegetables that are a delight to devour during the intense heat, and they come with the added benefit of being healthy for your body. It`s hot, scorching and sweaty days and...

read more
Benefits of Summer – Part 3

Benefits of Summer – Part 3

Sunny skies and rising temperatures do more than make our environment a pleasant place. They also provide some very significant benefits to our health and wellbeing. Sunlight helps to regulate almost all our bodily processes, as well as acting as a psychological...

read more
An Amazing Hadith about Summer – Part 2

An Amazing Hadith about Summer – Part 2

عَنْ أَبِي هُرَيْرَةَ، عَنِ النَّبِيِّ صلى الله عليه وسلم قَالَ ‏"‏ إِذَا اشْتَدَّ الْحَرُّ فَأَبْرِدُوا بِالصَّلاَةِ، فَإِنَّ شِدَّةَ الْحَرِّ مِنْ فَيْحِ جَهَنَّمَ وَاشْتَكَتِ النَّارُ إِلَى رَبِّهَا فَقَالَتْ يَا رَبِّ أَكَلَ بَعْضِي بَعْضًا‏.‏ فَأَذِنَ لَهَا...

read more
Why New Resolutions so Often Fail – Part 3

Why New Resolutions so Often Fail – Part 3

So we began the discussion yesterday on why so many of our new resolutions fail – why they are somewhat easy to make, yet so hard to follow through with. Today we will take you through a few more reasons why these resolutions don’t see the end of January. “Instead of...

read more

Subscribe to our Newsletter

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *