CURRENTLY ON AIR ⇒
  • JUZ/PARA A DAY
    Sunday, 12:05 pm - 1:00 pm
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 3

There are many kinds of attacks available to the dedicated hacker. These are among the most famous and frequent types of attacks.

1. Denial of service (DDoS):
This is an attack used to restrict the user’s access to the system resources by flooding the server with useless traffic. The botmaster (botmaster is the cyber-criminal/attacker who owns the botnet and responsible for its actions) commands all the bots to access a resource at the same time so that the resource gets hopelessly jammed up. Then, if a legitimate user wants to access that same resource, they will not be able to do so.

2. Malware attack:
This is a malicious program that disrupts or damages the computer. There are four main types of malware:
Keylogger: Keylogger records all the hits on the targeted keyboard. Most hackers use it to get passwords and account details.
Virus: A computer virus is a malicious code that replicates by copying itself to another program or document and changes how a computer works. The virus, such as the Melissa virus, requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator.
Worms: This is a standalone program that runs independently and infects the system. One of the more popular examples is W32.Alcra.F. The worm propagates itself through network share devices.
Trojan horse: This is a malicious code that takes over your computer. This code can damage or steal information from your computer.

3. Man in the middle:
Say, for example, you want to do an online transaction. You connect to your bank and conduct the payment. Simple, right?

Now, while you are doing a transaction, you have to enter the details of your card and the PIN. The cyber attacker spoofs you and monitors your transaction. As soon as you enter your details, he will have access to all of that information:

Tomorrow in sha Allah we will take a look at few other forms of cyber-attacks.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Plant Health

Recap (Threats facing Plant Health) Climate change, invasive pests and diseases, habitat destruction, and pollution are the most serious threats to plant life, disrupting ecosystems, reducing crop yields, and putting biodiversity at risk. Human actions — such as...

read more
Plant Health

Plant Health

Recap Plants are the foundation of our food system, providing 80% of the food we eat and indirectly supporting the rest through livestock feed. They supply essential nutrients, form the basis of global cuisines, and even contribute to medicine and cultural traditions....

read more
Plant Health

Plant Health

Recap (Importance of Plant Health) Plant health is essential for global food security, economic stability, and environmental sustainability—healthy plants provide the majority of the world’s food, support millions of livelihoods, and play a critical role in combating...

read more
Plant Health

Plant Health

Recap The International Day of Plant Health (May 12) was established by the United Nations to raise global awareness about the vital role of plants in food security, environmental health, and economic stability—especially in light of growing threats from pests,...

read more
Plant Health

Plant Health

International Day for Plant Health: History and Need Every year on May 12, the world comes together to observe the International Day of Plant Health (IDPH) — a day that highlights the crucial role plants play in sustaining life on Earth. This observance may not be as...

read more
Trust

Trust

Recap: How to Build Trust Trust is built through consistent, honest, and respectful behaviour over time, including keeping promises, being vulnerable, listening with empathy, and taking responsibility for mistakes. Trust requires patience and genuine connection,...

read more

Subscribe to our Newsletter

0 Comments