Your grandmother called you in the middle of the night very upset and worried. H
ID: 3705948 • Letter: Y
Question
Your grandmother called you in the middle of the night very upset and worried. Her computer screen is frozen, and she cannot do anything in her computer unless she pays some money to someone. You easily figured it out and fix the problem. A week later grandmother called you again and more upset and worried this time than last. She gave someone her social security number since the email came from her bank! You can’t blame her, can you? So now you trace back the DNS of the email account and retrieve the IP address of the adversary. This is PAYBACK time! You send 1 million spoof TCP request to teach that adversary a lesson. How many different types of attacks took place in the above scenario? Name them all and explain
Explanation / Answer
“Her computer screen is frozen”
The attack in this scenario is Ransomware is a type of malicious software from crypto virology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
“She gave someone her social security number since the email came from her bank!”
The attack in this scenario is Phishing
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Phishing is a serious problem that is achieved in a number of different ways. Email spoofing and website spoofing are two of the primary methods by which phishers acquire sensitive information from unsuspecting Internet users.
“send 1 million spoof TCP request to teach that adversary a lesson”
The attack in this scenario is Denial of service attack.
Denial of service attack is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.