Author Question: List and discuss at least five (5) common forms of computer sabotage that are used by hackers. ... (Read 38 times)

lb_gilbert

  • Hero Member
  • *****
  • Posts: 588
List and discuss at least five (5) common forms of computer sabotage that are used by hackers.
 
  What will be an ideal response?

Question 2

Psychosis describes the process of being unable to distinguish between external reality and internal fantasy
 
  a. True
  b. False



ghepp

  • Sr. Member
  • ****
  • Posts: 361
Answer to Question 1

DENIAL OF SERVICE (DoS)  Hackers attack or flood a server with phony authentication methods preventing people from accessing it and ultimately shutting it down.

VIRUSES  A computer program designed to infect a program file that may create annoying screen messages to wipe out an entire hard drive. Like a biological virus, a computer virus infects a host and uses the capabilities of its host to replicate. Once executed, a virus can cause damage by erasing or altering data or files, or by simply replicating until no disk space remains and the computer seizes to function. Viruses can be transmitted from one computer to another via email.

WORMS  Are computer programs designed to automatically make copies of themselves. Unlike viruses, a worm is self-executing, largely invisible to the computer users, and spreads from computer to computer over a network without any user action.

TROJAN HORSES  A program that appears to be useful or benign but actually conceals another program that is designed to be damaging, annoying, or humorous.

WEB / IP SPOOFS  Hackers create a false or shadow copy of a legitimate website that looks just like the real one, with all the same pages and links. All network traffic between the victims browser and the spoofed site are funneled through the hacker's machine. The hacker can acquire private information such as passwords, credit card numbers, account numbers, etc.

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

About 60% of newborn infants in the United States are jaundiced; that is, they look yellow. Kernicterus is a form of brain damage caused by excessive jaundice. When babies begin to be affected by excessive jaundice and begin to have brain damage, they become excessively lethargic.

Did you know?

Asthma-like symptoms were first recorded about 3,500 years ago in Egypt. The first manuscript specifically written about asthma was in the year 1190, describing a condition characterized by sudden breathlessness. The treatments listed in this manuscript include chicken soup, herbs, and sexual abstinence.

Did you know?

Chronic necrotizing aspergillosis has a slowly progressive process that, unlike invasive aspergillosis, does not spread to other organ systems or the blood vessels. It most often affects middle-aged and elderly individuals, spreading to surrounding tissue in the lungs. The disease often does not respond to conventionally successful treatments, and requires individualized therapies in order to keep it from becoming life-threatening.

Did you know?

Earwax has antimicrobial properties that reduce the viability of bacteria and fungus in the human ear.

Did you know?

The effects of organophosphate poisoning are referred to by using the abbreviations “SLUD” or “SLUDGE,” It stands for: salivation, lacrimation, urination, defecation, GI upset, and emesis.

For a complete list of videos, visit our video library