CURRENTLY ON AIR ⇒
  • Book Review
    Monday, 9:05 am - 10:00 am
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 3

There are many kinds of attacks available to the dedicated hacker. These are among the most famous and frequent types of attacks.

1. Denial of service (DDoS):
This is an attack used to restrict the user’s access to the system resources by flooding the server with useless traffic. The botmaster (botmaster is the cyber-criminal/attacker who owns the botnet and responsible for its actions) commands all the bots to access a resource at the same time so that the resource gets hopelessly jammed up. Then, if a legitimate user wants to access that same resource, they will not be able to do so.

2. Malware attack:
This is a malicious program that disrupts or damages the computer. There are four main types of malware:
Keylogger: Keylogger records all the hits on the targeted keyboard. Most hackers use it to get passwords and account details.
Virus: A computer virus is a malicious code that replicates by copying itself to another program or document and changes how a computer works. The virus, such as the Melissa virus, requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator.
Worms: This is a standalone program that runs independently and infects the system. One of the more popular examples is W32.Alcra.F. The worm propagates itself through network share devices.
Trojan horse: This is a malicious code that takes over your computer. This code can damage or steal information from your computer.

3. Man in the middle:
Say, for example, you want to do an online transaction. You connect to your bank and conduct the payment. Simple, right?

Now, while you are doing a transaction, you have to enter the details of your card and the PIN. The cyber attacker spoofs you and monitors your transaction. As soon as you enter your details, he will have access to all of that information:

Tomorrow in sha Allah we will take a look at few other forms of cyber-attacks.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

What Are We Leaving Behind – Part 5

What Are We Leaving Behind – Part 5

Earth is an Amanah What Are We Leaving Behind? We've talked about waste, water, cleanliness, and our role as khalifah. But today we ask the deepest question of all: When we leave this earth – and we will leave it – what will we leave behind? What will be written in...

read more
Cleanliness is Half of Faith – Part 4

Cleanliness is Half of Faith – Part 4

Earth is an Amanah Cleanliness is Half of Faith We've talked about waste, food, and water. Today we talk about something we see every day — outside our homes, our masjids, our schools. We talk about litter. We talk about rubbish in our streets. We talk about the...

read more
Water: A Sacred Resource – Part 3

Water: A Sacred Resource – Part 3

Earth is an Amanah Water: A Sacred Resource So far we've discussed our role as khalifah and the sin of wastefulness. Today we talk about water — the substance that makes up 60% of our bodies, the key to all life, and one of the most neglected amanah in our daily...

read more
Breaking the Culture of Excess – Part 2

Breaking the Culture of Excess – Part 2

The Earth is an Amanah: Live Like It Matters Breaking the Culture of Excess Yesterday we discussed that we are khalifah – stewards of the earth. Today we get practical. We open our fridges, our shopping bags, and our bin lids. Because the place where most...

read more
The Islamic Perspective on the Environment – Part 1

The Islamic Perspective on the Environment – Part 1

The Earth is an Amanah: Live Like It Matters The Islamic Perspective on the Environment This week Wednesday the 22nd of April is International Mother Earth Day. Our theme for this week is: "Earth Is an Amanah – Live Like It Matters." Today, we begin with a question:...

read more
Default Bias – Part 5

Default Bias – Part 5

Invisible Forces that Shape our Day Default Bias This is our final day exploring invisible forces that shape our day. We have covered routines, social contagion, the decoy effect, and the spotlight effect. Today we conclude with a force that is perhaps the most subtle...

read more

Subscribe to our Newsletter

0 Comments