Answer to Question #230016 in Computer Networks for shariq

Question #230016

Write briefly about each of the following terms. What are the latest trends in the Market? Search on Internet and come up with the current commonly used anti-malwares and antiviruses (10 marks)

 

Vulnerability

Threat

Risk

Attack

Backdoor

Hoaxes

Password Crack

Brute force

Dictionary attack

Spoofing

Man-in the Middle

Spam

Virus

Worm

Trojan

Zombie


1
Expert's answer
2021-08-26T19:00:18-0400

(1)Vulnerability - this is a weakness which can be exploited by a threat actor, such as an attacker to cross privilege boundaries for example, perform unauthorized actions within a computer system.

(2) Threat - is a potential violation of security.

(3) Risk - is defined as the potential for loss or damage when a threat exploits a vulnerability.

(4) Attack - these are actions that could cause it to occur must be guarded against (or prepared for).

(5) Backdoor - these are means to access a computer system or encrypted data that bypass the system’s customary security mechanisms.

(6) Hoaxes - is a message warning the recipients of a non-existent computer virus threat.

(7)Password crack - these are various measures used to discover computer password.

(8)Dictionary attack - is method of breaking into a password-protected computer, network or other IT resource by systematically entering word in a dictionary as a password.

(9)Brute force - is an attack in which hackers try a large number of possible keyboard password combinations to gain unauthorized access to a system or file.

(10)Spoofing - this is an impersonation of one entity by another, is a form of both deception and unsurpation.

(11)Man-in-the-middle - is a form of cyber attack is intercepted by an attacker using a technique to interject themselves into the communication process.

(12)Spam - is a digital junk mail: unsolicited communications sent in bulk over the internet or through any electronic messaging system


(13)Virus - is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.

(14) Worm - is a standalone malware computer program that replicates itself in order to spread to other computers.

(15)Trojan - is a type of malware that is often disguised as legitimate software.

(16)Zombie - is a computer connected to the Internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse program and can be used to perform malicious tasks under the remote direction of the hacker

Latest trend in the marker are; IOT with 5G network


Current commonly used anti-malwares and antivirus

1.Bit defender

2.Webroot Secure Anyewhere for Mac

Kapersky

3.Norton

4.Trend Micro



Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Comments

No comments. Be the first!

Leave a comment

LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS