Write briefly about each of the following terms. What are the latest trends in the Market? Search on Internet and come up with the current commonly used anti-malwares and antiviruses (10 marks)
Vulnerability
Threat
Risk
Attack
Backdoor
Hoaxes
Password Crack
Brute force
Dictionary attack
Spoofing
Man-in the Middle
Spam
Virus
Worm
Trojan
Zombie
(1)Vulnerability - this is a weakness which can be exploited by a threat actor, such as an attacker to cross privilege boundaries for example, perform unauthorized actions within a computer system.
(2) Threat - is a potential violation of security.
(3) Risk - is defined as the potential for loss or damage when a threat exploits a vulnerability.
(4) Attack - these are actions that could cause it to occur must be guarded against (or prepared for).
(5) Backdoor - these are means to access a computer system or encrypted data that bypass the system’s customary security mechanisms.
(6) Hoaxes - is a message warning the recipients of a non-existent computer virus threat.
(7)Password crack - these are various measures used to discover computer password.
(8)Dictionary attack - is method of breaking into a password-protected computer, network or other IT resource by systematically entering word in a dictionary as a password.
(9)Brute force - is an attack in which hackers try a large number of possible keyboard password combinations to gain unauthorized access to a system or file.
(10)Spoofing - this is an impersonation of one entity by another, is a form of both deception and unsurpation.
(11)Man-in-the-middle - is a form of cyber attack is intercepted by an attacker using a technique to interject themselves into the communication process.
(12)Spam - is a digital junk mail: unsolicited communications sent in bulk over the internet or through any electronic messaging system
(13)Virus - is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.
(14) Worm - is a standalone malware computer program that replicates itself in order to spread to other computers.
(15)Trojan - is a type of malware that is often disguised as legitimate software.
(16)Zombie - is a computer connected to the Internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse program and can be used to perform malicious tasks under the remote direction of the hacker
Latest trend in the marker are; IOT with 5G network
Current commonly used anti-malwares and antivirus
1.Bit defender
2.Webroot Secure Anyewhere for Mac
Kapersky
3.Norton
4.Trend Micro
Comments
Leave a comment