Write briefly about each of the following terms. What are the latest trends in the Market? Search on Internet and come up with the current commonly used anti-malwares and antiviruses (5 marks)
Vulnerability
Threat
Risk
Attack
Backdoor
Hoaxes
Password Crack
Brute force
Dictionary attack
Spoofing
Man-in the Middle
Spam
Virus
Worm
Trojan
Zombie
Definition of terms
Vulnerability is a weakness which can be exploitedby a threat actor, such as an attacker, to cross privilege boundaries (i.e. perform unauthorized actions) within a computer system.
A threat is a potential violation of security.
Risk is defined as the potential for loss or damage when a threat exploits a vulnerability.
Attack is actions that could cause it to occur must be guarded against (or prepared for).
Backdoor is a means to access a computer system or encrypted data that bypass the system’s customary security mechanisms.
Hoax is a message warning the recipients of a non-existent computer virus threat.
Password crack is various measures used to discover computer password.
Dictionary attack is method of breaking into a password-protected computer, network or other IT resource by systematically entering word in a dictionary as a password.
Brute force is attack in which hackers try a large number of possible keyboardor password combinations to gain unauthorized access to a system or file.
Spoofing is an impersonation of one entity by another, is a form of both deception and unsurpation.
Man-in-the-middle (MitM) is aform of cyber attack is intercepted by an attacker using a technique to interject themselves into the communication process.
Spam is digital junk mail: unsolicited communications sent in bulk over the internet or through any electronic messaging system
Virus is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.
Worm is a standalone malware computer program that replicates itself in order to spread to other computers.
Trojan is a type of malware that is often disguised as legitimate software.
Zombie is a computer connected to the Internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse program and can be used to perform malicious tasks under the remote direction of the hacker
What are the latest trends in market: IOT with 5G network
Current commonly used anti-malwares and antivirus
Bit defender
Webroot Secure Anyewhere for Mac
Kapersky
Norton
Trend Micro
Comments
thank u so much
Leave a comment