1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
9

Hello please I really need help with this please help me with this please please

Social Studies
1 answer:
KATRIN_1 [288]3 years ago
6 0

Answer:

7 Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types of cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:

Block access to key network components (ransomware)

Install additional harmful software

Covertly obtain information by transmitting data from the hard drive (spyware)

Disrupt individual parts, making the system inoperable

2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. A botnet is a type of DDoS in which millions of systems can be infected with malware and controlled by a hacker, according to Jeff Melnick of Netwrix, an information technology security software company. Botnets, sometimes called zombie systems, target and overwhelm a target’s processing capabilities. Botnets are in different geographic locations and hard to trace.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party transaction. After interrupting the traffic, they can filter and steal data, according to Cisco. MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers insert themselves between the visitor and the network, and then use malware to install software and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. When infected, the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box.

7. Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing.

Explanation:

You might be interested in
Compare and Contrast Oil and Lumber Industry
blondinia [14]

Answer:

Lumber Industry - The wood industry or lumber industry is the industry concerned with forestry, logging, timber trade, and the production of primary forest products and wood products (e.g. furniture) and secondary products like wood pulp for the pulp and paper industry.

Oil Industry - Oil and natural gas are major industries in the energy market and play an influential role in the global economy as the world's primary fuel sources. The processes and systems involved in producing and distributing oil and gas are highly complex, capital-intensive, and require state-of-the-art technology.

6 0
2 years ago
Which group's image has been more integrated into mainstream media due to the work of John Singleton and Spike Lee?
viva [34]

Answer:

D. African Americans​

Explanation:

Both John Singleton and Spike Lee were known for their works in the film industry.

They brought up a lot of issues that's often found within the African American community and help US public shape their false image/perception that they often have toward them.

On top of that, they also often brought up stories about popular figures from African American community. They wanted their audience to learn and have some sort of figure that they can follow to help them advance in society.

3 0
3 years ago
Read 2 more answers
The ideology that supports unity and cooperation among all African nations is known as __________.
steposvetlana [31]
<span>c. Pan-Africanism

Hope this helps :)</span>
5 0
3 years ago
Read 2 more answers
Which of the following is an example of a service provided by the federal government?
LiRa [457]

Answer:

An insterstate highway

Explanation:

6 0
3 years ago
Read 2 more answers
What was part of the Supreme Court’s ruling in McCulloch v. Maryland? State governments are supreme over the federal government.
k0ka [10]

the third one. The supreme court has the power of judicial review.

6 0
3 years ago
Read 2 more answers
Other questions:
  • The U.S. two-party system was based on the bicameral system in __________
    10·2 answers
  • What parts of the body can become fossils
    7·2 answers
  • If darren hits zaya because she took his truck away and the teacher recognizes that the hitting was because darren has limited l
    7·1 answer
  • School-age children can be bundles of crazy energy. what distinguishes adhd from normal childhood behavior?
    9·1 answer
  • Piaget's intrigue concerning _____ initially spurred his interest in cognitive development.
    5·1 answer
  • How many people died in the united states each year for car accidents?
    13·1 answer
  • Who ensures that the process of selecting the delegates and electors is run fairly and according to state and federal rules?
    10·1 answer
  • What is the belief that the interests of the states were higher than the interests of the federal government?
    10·1 answer
  • In some situations, the House of Representatives can elect the president of the United States.
    12·1 answer
  • WILL MARK BRAINLIEST AMD THANKS
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!