Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

What kinds of cyber-attacks have you experienced? Have you had a computer that w

ID: 2246985 • Letter: W

Question

What kinds of cyber-attacks have you experienced? Have you had a computer that was infected with a virus? Have you been unable to use a site experiencing a DOS attack, or downloaded spyware or a Trojan horse? Do you receive phishing e-mails? What do you do to secure your information on the Internet?
What kinds of cyber-attacks have you experienced? Have you had a computer that was infected with a virus? Have you been unable to use a site experiencing a DOS attack, or downloaded spyware or a Trojan horse? Do you receive phishing e-mails? What do you do to secure your information on the Internet?
What kinds of cyber-attacks have you experienced? Have you had a computer that was infected with a virus? Have you been unable to use a site experiencing a DOS attack, or downloaded spyware or a Trojan horse? Do you receive phishing e-mails? What do you do to secure your information on the Internet?

Explanation / Answer

Answer:

cyber-attacks i have experienced:

Socially engineered malware:

Socially engineered malware, lately often led by data-encrypting ransomware, provides the No. 1 method of attack (not a buffer overflow, misconfiguration or advanced exploit). An end-user is somehow tricked into running a Trojan horse program, often from a website they trust and visit often. The otherwise innocent website is temporarily compromised to deliver malware instead of the normal website coding.

Password phishing attacks:

Coming a close second are password phishing attacks. Approximately 60 to 70 percent of email is spam, and much of that is phishing attacks looking to trick users out of their logon credentials. Fortunately, anti-spam vendors and services have made great strides, so most of us have reasonably clean inboxes. Nonetheless, I get several spam emails each day, and a least a few of them each week are darned good phishing replicas of legitimate emails.

Unpatched software:

Coming in close behind socially engineered malware and phishing is software with (available but) unpatched vulnerabilities. The most common unpatched and exploited programs are browser add-in programs like Adobe Reader and other programs people often use to make surfing the web easier. It's been this way for many years now, but strangely, not a single company I've ever audited has ever had perfectly patched software. It’s usually not even close. I just don't get it.

Social media threats:

Our online world is a social world led by Facebook, Twitter, LinkedIn or their country-popular counterparts. Social media threats usually arrive as a rogue friend or application install request. If you’re unlucky enough to accept the request, you’re often giving up way more access to your social media account than you bargained for. Corporate hackers love exploiting corporate social media accounts for the embarrassment factor to glean passwords that might be shared between the social media site and the corporate network. Many of today’s worst hacks started out as simple social media hacking. Don’t underestimate the potential.

Advanced persistent threats:

I know of only one major corporation that has not suffered a major compromise due to an advanced persistent threat (APT) stealing intellectual property. APTs usually gain a foothold using socially engineered Trojans or phishing attacks.

A very popular method is for APT attackers to send a specific phishing campaign -- known as spearphishing -- to multiple employee email addresses. The phishing email contains a Trojan attachment, which at least one employee is tricked into running. After the initial execution and first computer takeover, APT attackers can compromise an entire enterprise in a matter of hours. It's easy to accomplish, but a royal pain to clean up.

computer that was infected with a virus:

i had experiance with virus my computer was in infected with a virus many times.

Warning Signs that Your Computer is Malware-Infected:

ymptoms of a malware infection

spyware or a Trojan horse:

Spyware:

A general term for a program that surreptitiously monitors your actions. While they are sometimes sinister, like a remote control program used by a hacker, software companies have been known to use spyware to gather data about customers. The practice is generally frowned upon.

Trojan Horse:

An apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data.

The following points summarise the combined effects of Spyware and Trojan Horses:

They can be installed on your computer automatically (often (in the case of the Trojan Horse), without your consent).

They perform the collection of data from your computer without your consent.

They can execute program code on your computer without your consent.

They can assign a unique code to you, which they can use to uniquely identify your machine.

They can collect data pertaining to your habitual computer use.

They are particularly difficult to completely remove and are sometimes automatically re-installed.

They perform undesirable tasks without your consent.

Trojan Horses have more severe symptoms which are transparent to the end-user. These may also include slow connections, targeted e-mail (spam) and system crashes. However, more sinister actions beside these are the purpose of the Trojan. Their creators can usually access them, which in turn gives access to the user's computer. This is known as a "backdoor". Once access has been gained by the malicious party, they have (albeit unauthorized) access to data and system settings on that machine. These unauthorized privileges may be used for any number computer security breaches or types of digital crime.

Do you receive phishing e-mails:

i received pishing emails some times.but i dont know actually that are phising emails or not.

Phishing email will typically direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has.

What do you do to secure your information on the Internet:

Some ways to protect your privacy on the internet:

1. The Basics

You’re probably already doing these things suggested by organizations like the National Cybersecurity Alliance, but it doesn’t hurt to be reminded because they are so important:

If In Doubt, Throw It Out

Since malware and phishing scams are getting more sophisticated, try not to open emails that look suspicious or unusual, especially if they relate to your email, social media, financial services, or utility accounts. Delete these messages.

This goes double for links and attachments in emails related to these kinds of accounts or services — don’t click them unless you are absolutely sure of the source. If you get an email about an issue or past due balance or a refund, rather than click on a link, go to the provider’s website directly and log in to your account there, or call the provider.

Stay Updated

Keep your computer’s operating system, browser, and security software up to date. Turn on automatic updates for these wherever possible.

Think Before You Act

Be especially wary and vigilant if an offer demands you act immediately, sounds too good to be true, or asks for personal information.

2. Privacy Settings

3. Blocking Cookies

4. Unlinking Accounts

5. Secure Connections, Firewalls and Antivirus Services

6. Stronger Passwords

7. Better Browsing

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote