1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
3 years ago
8

What are the most recent attacks on computer security that you face this month? Use the Internet to search for the latest attack

s. You may want to visit security vendor sites, like Symantec or McAfee, or security research sites such as SANS to find the latest information. What are the new attacks this month? How dangerous are these new attacks? What new defenses are being proposed? Use the Internet to search for the latest information regarding current viruses. You may want to visit security vendor sites, like Symantec or McAfee, or security research sites such as SANS to find the latest information. What are the latest viruses? What type of damage can they do? Which platforms are the most vulnerable?
Computers and Technology
1 answer:
grigory [225]3 years ago
6 0

Answer:

Now a days every thing can be done on the internet easily but this internet has various drawbacks with that as the most of our personal information we share on internet these days so if anyone attacks on your server then he/she can easily access all the private information including financial details and this attack is known as cyber attack. there are various ways to attack on the internet some of them are-

1.Malware- it is shortly known as the malicious software, malware can be described as worms, viruses, trojans these all are variety of malware which provide root access to the attacker by which they can control the system remotely.

2.phising- This is a technique by which the criminals craft emails to fool a target into taking some harmful action. The recipient might be tricked in downloading malware that disguised as an important document for instance or argued toclick on that link that takes them to a fake website where they can get the password which are necessary for any transaction.

3.Ransomware- This is like a malware which is stored in the computer and easily encrypt all the necessary files of the victim's computer and after that they demand some ransom to decrypt it.

4.SQL injection- This is the process by which the SQL command gets injected by the attacker into the victim's system so that the attacker can easily gather all the necessary information which they want to take control on the system.

These attacks are very dangerous for the system because the attacker can get all the necessary information about the user and can easily harm him/her by getting their personal information.

There are various steps to prevent these attacks which are-

I.secure your hardware- The user has to prevent their hardware from lost or steal. protect all devices with a complicated password, share that password with the device user only.

II.Encrypt and backup data- You have to prevent your data by making the backup of the necessary files so that if any of your information gets lost then you can retrieve it from your backup.

III. create a security focused workplace- Employees are the most common ways of breaching of the data as many don't recognise the external threats the internal one breaches the security and it cause the loss of the information.

some latest viruses are-

1.cyborg ransomware-This virus is present in the floppy disk which is used by the user and can cause the count of time the system reboot. it's new variant is present in windows 10.

2.Gobrut-This is also one of the latest viruses it is capable enough to detect weak passwords and can cause loss of information.

3.jokeroo-This virus works as the ransomware their author spread it in the computer system which will encrypt the files and for decrypting it they demand ransom for that.

4.Trojan Glupteba- Once this virus enters the system the user cannot know that the system is infected and it will slowly communicates with the IP of the system which results in loss of the confidential information.

Most vulnerable platforms are-

1.Social engineering- The social networking sites has most of your personal information of the user which can be used by the attacker to get the necessary information.

2.cloud computing services- More companies use to store their most of the information on the cloud which is used by the attacker to get the confidential passwords which can cause loss of the essential information.

Explanation:

You might be interested in
Which version of Windows was considered an operating environment rather than an operating system? Windows 1.0 Windows 3.0 Window
Goryan [66]
<span>1.0 Windows was considered an operating environment not an operating system</span><span />
6 0
3 years ago
In the u.s.all financial institutions are required to conduct business at a physical location only
Ad libitum [116K]

Answer:

The answer is false.

Explanation:

5 0
3 years ago
Decisions 1 and 3 are both ____________ decisions because ____________________.
Hoochie [10]

The Question given is incomplete so from the internet the complete question is as follows:

Health Day Regional Medical center's management team has several decisions to make. They are attempting to sort out what to do first. The decisions are as follows:

1. Determine which patients to be admitted for the next day.

2. Decide weather or not to purchase the only other medical center in their          region.

3. Decide which candidates will meet the requirements for the nursing training program.

4. Determine weather the medical center should diversify into more advanced (and substantially more costly ) technologies.

Decisions 1 and 3 are both ____________ decisions because ____________________.

A. Programmed decisions; they are novel and complex

B. Non programmed decisions; they are novel and complex  

C. Programmed decisions; they are can be solved using rules and procedures

D. Non programmed decisions; they are novel and complex

E. None of the above is correct

Answer:

Option C is the correct answer.

Decisions 1 and 3 are both Programmed decisions because they can be solved using rules and procedures .

Explanation:

Programmed Decisions can be defined as the ones that are specified and developed for routine problems that are repetitive. These decisions deal with certainty.

Now from the given list of decisions, it is obvious that the decision 1 and 3 are programmed.

  • Patients that are to be admitted must undergo through the rules and regulations so that a decision may be taken.
  • Similarly in the case of nurses, proper testing must be conducted and candidates are selected upon this criteria.

<h2>I hope it will help you!</h2>

5 0
3 years ago
The advancement in speed of transportation is attributed to invention of this device
morpeh [17]
The automobile is the invention
3 0
3 years ago
Importance of computer education​
Stells [14]

Answer:

hope this helped

Explanation:

Computer technology has helped the world to grow and evolve quickly. By performing tasks quickly, computers make daily activities more convenient. They give people access to a wide array of information and can reach even the most remote locations on the planet.

6 0
3 years ago
Other questions:
  • What is the acronym for computerized command provides weather by microphone clicks?
    8·1 answer
  • What is the order of arrangement of files and folders on a computer?
    15·1 answer
  • How do I download the Microsoft word on my Hp probook
    8·2 answers
  • Throughout the course we have covered a lot of topics in relation to information systems. Select one or two of the major topics
    14·1 answer
  • Can you make copies of classified documents provided you alert others?
    6·1 answer
  • write the cell address for the following 1. First row and first column 2.First column and last row. 3. 10th column and 19th row.
    5·1 answer
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • Diverting an attacker from accessing critical systems, collecting information about the attacker's activity and encouraging the
    8·1 answer
  • Choose the type of error described.
    12·1 answer
  • What is the output of the following JavaScript code?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!