Article in International Journal of Computer Networks and Communications Security · June 016 citations 56 reads 15,158 authors: Some of the authors of this publication are also working on these related projects



Download 274,58 Kb.
Pdf ko'rish
bet16/28
Sana17.05.2023
Hajmi274,58 Kb.
#940219
1   ...   12   13   14   15   16   17   18   19   ...   28
Bog'liq
CybercrimeandCybercriminal-2016

2.42 Shrink wrap code attacks
:
These attacks are 
aimed at applications immediately after its initial 
installation. The most common vulnerability is to 
exploit default code from libraries. 
2.43 Smurf attack
:
A DoS attack that spoofs the 
source host to flood the target computer with ping 
replies. 
 
2.44 Social Engineering
:
Hackers use social tactics 
to persuade people to reveal sensitive information 
that can be later used for malicious actions. Social 
engineering types include using human interaction, 
computers or mobile devices. 
Attackers normally pose as legitimate users, VIP 
executives or technical support analyst to commit 
their attacks. Best anti-social engineering strategies 
are education, security awareness training and 
enforcement of IT security policies. 
2.45 Spear phishing
:
This attack targets a specific 
user or a group of users. Normally uses an email 
that seems legitimate to ask for some wire transfer 
already approved by a top executive within a 
company.
2.46 Spim
:
Spam instant messaging targets instant 
messaging apps such Yahoo Messenger, WhatsApp 
and Line. The attackers need mobile number 
confirmation if the users click the link. Best way to 
deal with Spim is to ignore the messages and delete 
them. 
2.47 Spoofing
:
Cyberattacks can use spoofing in 
many ways, from changing IP addresses to 
changing Media Access Control (MAC) addresses 
to email address by hiding the attacker identity. 
2.48 SQL injection
:
These attacks are the highest 
web vulnerability impacts on the Internet. A flaw in 
the coding of a web application is exploited to 
allow additional data entry to generate unique SQL 
statements. 
Many 
relational 
databases 
are 
vulnerable to this attack including DB2, MySQL 
and SQL SRV. These attacks can avoid 
authentication, trigger code execution and affect 
data integrity.

Download 274,58 Kb.

Do'stlaringiz bilan baham:
1   ...   12   13   14   15   16   17   18   19   ...   28




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish