Article in International Journal of Computer Networks and Communications Security · June 016 citations 56 reads 15,158 authors: Some of the authors of this publication are also working on these related projects


Extortive malware that  locks user‘s data in order to get payment  for unlocking the data



Download 274,58 Kb.
Pdf ko'rish
bet14/28
Sana17.05.2023
Hajmi274,58 Kb.
#940219
1   ...   10   11   12   13   14   15   16   17   ...   28
Bog'liq
CybercrimeandCybercriminal-2016

:
Extortive malware that 
locks user‘s data in order to get payment 
for unlocking the data. 
 
2.31 Man-in-the middle (MITM):
This type of 
attack allows active interception of network traffic 
and sending malicious code to the client‘s machine. 
Kerberos prevent MITM attacks by enforcing 
authentication. 
2.32 Misconfiguration attacks
:
These attacks take 
advantage of wrong, default or compromised 
configurations to access systems, networks
computers, 
servers, 
mobile 
devices 
or 
interconnection devices. 
2.33 Near field communication (NFC):
There are 
a few attacks under NFC including eavesdropping, 
data corruption and smartphone viruses. NFC 
devices can communicate if the separation is four 
centimeters or less. The biggest risk is card 
skimming due to the fact when mobile card readers 
are used to complete the online payments. NFC 
channels are also vulnerable to MITM attacks.
2.34 Packet sniffing
:
Attackers use protocol 
analyzer or sniffer programs like Wireshark
TCPDump and Sniff-O-Matic to capture and track 
network packets. Unencrypted data is the most 
vulnerable when using sniffers – captured packets 
can easily be read and analyzed data can also be 
used to plan further cyberattacks. 
2.35 Password attacks
:
These attacks use different 
techniques to crack server, network device, systems 
or user passwords. Weak passwords can be avoided 
if they use a long combination of capital/ small case 
letters, numbers and special characters. Cracking 
techniques include brute force, rule based, 
dictionary, hybrid and syllable attacks. Some 
password cracking tools are L0phtCrack, John the 
Ripper, Cain and Abel, Passscape and Aircrack. 

Download 274,58 Kb.

Do'stlaringiz bilan baham:
1   ...   10   11   12   13   14   15   16   17   ...   28




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish