fbpx
CURRENTLY ON AIR ⇒
  • Highlights of the Days Programmes
    Thu, 10:05 pm - 4:00 am
    [ - ]

feedback@radioislam.org.za

Radio Islam Logo


((( Listen Live )))))
Radio Islam Logo


Types of Attacks – Part 4

Dec 02, 2021

In yesterday`s discussion we took a look at three ways in which cyber criminals will attack your computer, today we continue with the discussion.

4. Phishing:
The attacker sends bait, often in the form of an email. It encourages people to share their details. For example, you get an email like this:

If someone is a customer of ABC bank, he would probably open the link and enter the details. But these kinds of emails are always phishing. Banks do not send emails like this.

5. Eavesdropping:
Attacker observes traffic on your system and the work you are doing. The attacker can monitor you in three ways:
1. Email monitoring
2. Which websites you visit
3. What items you download

6. SQL injection:
As the name suggests, an SQL injection vulnerability allows an attacker to inject malicious input into a SQL statement. This type of attack happens only on websites. The best example would be www.facebook.com. There is a database stored on the Facebook website. The hackers get into that database and sign in using someone else’s username and password.

7. Password attack:
To crack a password or find a password, hackers employ the following techniques:
Dictionary attack: In this method, they handle every password that is possible through the dictionary
Brute force: It is a trial and error method used to decode the password or data. This attack takes the most amount of time.
Keylogger: As the name suggests, keylogger records all the hits on the keyboard. Most people use it to get passwords and account details
Shoulder surfing: The attackers observe the user’s keyboard by looking over the user’s shoulder.
Rainbow table: There are rainbow tables that contain precomputed hash values. Attackers use this table to find the user’s password.

8. Social engineering:
Attackers create social situations that encourage you to share your password. For example, let’s say that you are out of your office, and you get a call. The person says that he is from the IT department and they have found out that your system has been compromised. He asks you to share your password. You might believe him and share your password. However, the caller was, in fact, a hacker, and now he has your password. Now that he has access, he can compromise your organization’s data. The best way to avoid the effects of social engineering is to learn your organization’s protocol regarding password sharing.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Khadijah RA: Lineage and Family – Part 1

Khadijah RA: Lineage and Family – Part 1

We have concluded the discussion on the Women Around Musa AS, and since we are still in August which is known as Women`s Month, we will continue to focus on Honouring Muslim Women who undoubtedly made a huge impact on Islam. From these women, the greatest to look at...

read more
Musa AS`s Marriage – Part 7

Musa AS`s Marriage – Part 7

Yesterday we stopped where Musa AS had displayed his kindness to the two women and helped them water their animals. Now, when the two women came back so quickly with the sheep watered, their father was surprised because he knew the men near the well, that his girls...

read more
Musa AS in Madyan – Part 6

Musa AS in Madyan – Part 6

We have already covered three women in the life of Musa AS viz. His mother, sister and Asiyah. Today we will look at the fourth, and that is his wife. We know about the incident between the man from Bani Israel and the Coptic and how Musa AS had helped the man and how...

read more
Musa AS and Asiyah – Part 5

Musa AS and Asiyah – Part 5

We have thus covered two women related to Musa AS i.e. his Mother and his Sister and we have learned some wonderful lessons and characteristics which they displayed. Today we will take a look at Asiyah, the wife of Firoun. Musa AS was handed this particular fate of...

read more
Musa AS Returned to his Mother – Part 4

Musa AS Returned to his Mother – Part 4

فَٱلْتَقَطَهُۥٓ ءَالُ فِرْعَوْنَ لِيَكُونَ لَهُمْ عَدُوًّا وَحَزَنًا “Firoun’s household picked him up – later to become an enemy and a source of grief for them… [Al Qasas 28: 8] وَقَالَتِ ٱمْرَأَتُ فِرْعَوْنَ قُرَّتُ عَيْنٍ لِّى وَلَكَ ۖ لَا تَقْتُلُوهُ عَسَىٰٓ أَن...

read more
The Firm Belief of Umme Musa – Part 3

The Firm Belief of Umme Musa – Part 3

وَأَصْبَحَ فُؤَادُ أُمِّ مُوسَىٰ فَـٰرِغًا ۖ إِن كَادَتْ لَتُبْدِى بِهِۦ لَوْلَآ أَن رَّبَطْنَا عَلَىٰ قَلْبِهَا لِتَكُونَ مِنَ ٱلْمُؤْمِنِينَ “The next day, Musa AS’s mother felt a void in her heart (faarighan) – if We had not strengthened (rabatna) it to make her...

read more

Subscribe to our Newsletter

0 Comments

Submit a Comment

Your email address will not be published.