Monday, 16 April 2018

Security Threats

EXERCISE

(1) Describe the following and explain how it works:

Sniffing/wiretapping/eavesdropping on network traffic:

  • Wiretapping is achieved either through the placement of a monitoring device informally kown as a bug on the wire in question or through other communication technologies. Place a device or program to intercept or monitor packets that sent over the network. Sensitive information such as passwords and trade secrets can be captured.

Exploiting security weakness:

  •  An exploit is the next step in a hacker's playbook after finding a vulnerability, gains access to your own gains to track user's financial information. 
Internet Protocol (IP) spoofing:
  • It is refer to network hijacking. The hacker's can access the user's information when they use the same network.
Social engineering:
  • It is the art of manipulating people so they give up confidential information. This attacker can trick the user's by giving them your passwords or bank information, so that they can access and controlling your computer  by installing an software. 

REFERENCES:


What is wiretapping? - Definition from WhatIs.com

WhatIs.com. (2018). What is wiretapping? - Definition from WhatIs.com. [online] Available at: https://whatis.techtarget.com/definition/wiretapping [Accessed 17 Apr. 2018].




Vulnerabilities, Exploits, and Threats: A Deep Dive | Rapid7

Rapid7. (2018). Vulnerabilities, Exploits, and Threats: A Deep Dive | Rapid7. [online] Available at: https://www.rapid7.com/fundamentals/vulnerabilities-exploits-threats/ [Accessed 17 Apr. 2018].


What is IP Spoofing? - Definition from Techopedia

Techopedia.com. (2018). What is IP Spoofing? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/3993/ip-spoofing [Accessed 17 Apr. 2018].


What is Social Engineering? Examples and

Webroot.com. (2018). What is Social Engineering? Examples and. [online] Available at: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering [Accessed 17 Apr. 2018].


No comments:

Post a Comment