Answer to Question #229599 in Computer Networks for shariq

Question #229599

Write briefly about each of the following terms. What are the latest trends in the Market? Search on Internet and come up with the current commonly used anti-malwares and antiviruses (5 marks)

 

Vulnerability

Threat

Risk

Attack

Backdoor

Hoaxes

Password Crack

Brute force

Dictionary attack

Spoofing

Man-in the Middle

Spam

Virus

Worm

Trojan

Zombie


1
Expert's answer
2021-08-26T06:35:36-0400

Definition of terms


Vulnerability is a weakness which can be exploitedby a threat actor, such as an attacker, to cross privilege boundaries (i.e. perform unauthorized actions) within a computer system.


A threat is a potential violation of security.


Risk is defined as the potential for loss or damage when a threat exploits a vulnerability.


Attack is actions that could cause it to occur must be guarded against (or prepared for).


Backdoor is a means to access a computer system or encrypted data that bypass the system’s customary security mechanisms.



Hoax is a message warning the recipients of a non-existent computer virus threat.


Password crack is various measures used to discover computer password.


Dictionary attack is method of breaking into a password-protected computer, network or other IT resource by systematically entering word in a dictionary as a password.


Brute force is attack in which hackers try a large number of possible keyboardor password combinations to gain unauthorized access to a system or file.


Spoofing is an impersonation of one entity by another, is a form of both deception and unsurpation.



Man-in-the-middle (MitM) is aform of cyber attack is intercepted by an attacker using a technique to interject themselves into the communication process.


Spam is digital junk mail: unsolicited communications sent in bulk over the internet or through any electronic messaging system


Virus is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.


Worm is a standalone malware computer program that replicates itself in order to spread to other computers.


Trojan is a type of malware that is often disguised as legitimate software.


Zombie is a computer connected to the Internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse program and can be used to perform malicious tasks under the remote direction of the hacker


What are the latest trends in market: IOT with 5G network


Current commonly used anti-malwares and antivirus

Bit defender

Webroot Secure Anyewhere for Mac

Kapersky

Norton

Trend Micro



Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Comments

shariq
26.08.21, 13:42

thank u so much

Leave a comment

LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS