Bpp learning Media is an acca approved Content Provider



Download 5,67 Mb.
Pdf ko'rish
bet361/727
Sana05.04.2022
Hajmi5,67 Mb.
#530463
1   ...   357   358   359   360   361   362   363   364   ...   727
Bog'liq
F1 BPP ST(August 2020) [Unlocked by www.freemypdf.com] (1)

259 
Type of cyber attack 
Description 
Distributed Denial of Service (DDoS) attack 
The cyber-attacker attempts to disrupt an 
organisation's online activities by preventing 
people from accessing the organisation's website. 
Botnets (large numbers of individual computers 
which have been taken over without the user 
knowing) are instructed to overwhelm the 
organisation's website with a wave of internet 
traffic so that the system is unable to handle it and 
may cause it to crash. 
Webcam manager 
The cyber-attacker uses software to take control of 
the user's webcam. 
File hijacker/ransomware 
The cyber-attacker gains access to the user’s 
system to hijack their files and hold them to 
ransom 
Keylogging 
The cyber-attacker plants software onto the user’s 
computer to record what the user types onto their 
keyboard. The objective is to learn passwords and 
user details to gain access to confidential 
information. 
Screenshot manager 
The cyber-attacker obtains information from the 
victim by installing software onto the user’s 
computer to enable screenshots of the user's 
computer screen to be taken. Like other cyber-
attacks, the purpose can be to steal information, 
funds, or may even be to perform corporate 
espionage. 
Ad clicker 
The cyber-attacker directs the victim's computer to 
a bogus website by encouraging them to click on a 
specific link contained in online advertising. 
Several types of cyber-attack, such as webcam manager, keylogging and screenshot manager rely on the 
cyber-attacker installing software onto the victim’s computer. This is often achieved through the use of 
Trojans. A 
Trojan
is a software program that masquerades as a desirable application, eg a virus 
checker, which the victim is happy to download and install.
6.4.3 Cyber security methods 
The table below contains some common cyber security methods used by organisations. 

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   357   358   359   360   361   362   363   364   ...   727




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish