![]() |
Css :- motivationbank.net |
Question:-
Discuss error 404 hacking digital India part 1 chase .
Answer :-
1. In error 404 hacking digital India part 1 chase , the cyber crime and cyber attacks hack the information of users like bank detail and personal information
2. It is real time incident . In this , attacker or hacker creates an attractive video so that victim gets attracted and plays that video into system .
3. When we clicked on video to play then at the time of buffering , hacker can know our current location and GPS history but also have complete access to our contacts , text messages , Facebook , Whatsapp and most importantly our bank details , including our CVV number
4. Hackers are creating a kind Trojan file , and android apk files . The apk files that will be distributed all over the internet . Those who download this file will be hacked easily
5. Potential cyber attacks that is most common in error 404 hacking :
A ).Web Application attacks :
.i.) A web application is a client - server computer program which uses web browsers and web technology to allow its visitors to store and retrieve data to / from the database over the internet .
ii ). If there is flaw in the web application , it allows the attacker to manipulate data using SQL injection attack .
B. ). Network security attacks :
i ).Network security attacks are unauthorized actions against private , corporate or governmental IT assets in order to destroy them modify them or steal sensitive data .
ii ). As more enterprises invite employees to access data from mobile devices , networks become vulnerable to data theft or total destruction of the data or network .
C). Mobile security attacks :
I ). Mobile security , or mobile device security , has become increasingly important in mobile computing .
ii). The security of personal and business information now stored on smartphones .
iii ). More and more users and businesses use smartphones to communicate , but also to plan and organize their users ' work and also private life .
iv). Within companies , these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks .
V). Indeed , smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company .
Question :-
How can we defend zero - day vulnerabilities ?
Answer :-
1. A zero - day vulnerability is a computer software vulnerability that is unknown to , or unaddressed by , those who should be interested in mitigating the vulnerability ( including the vendor of the target software ) .
2. Until the vulnerability is mitigated , hackers can exploit it to adversely affect computer programs , data , additional computers or a network .
3. An exploit directed at a zero - day is called a zero - day exploit , or zero - day attack .
4. The term ' zero - day referred to the number of days since a new piece of software was released to the public . So , ' zero - day ' software was software that had been obtained by hacking into a developer's computer before release .
5. The term was applied to the vulnerabilities that allowed this hacking , and to the number of days that the vendor has had to fix them .
6 . Once the vendor learns of the vulnerability , the vendor will usually create patches or advise workarounds to mitigate it .
7. The more recently that the vendor has become aware of the vulnerability , the more likely that no fix or mitigation has been developed .
8. Even after a fix is developed , the fewer the days , the higher the probability that an attack against the afflicted software will be successful , because not every user of that software will have applied the fix .
9. For zero - day exploits , unless the vulnerability is inadvertently fixed , For example , by an unrelated update that happens to fix the vulnerability , the probability that a user has applied a vendor - supplied patch that fixes the problem is zero , so the exploit would remain available . Zero - day attacks are a severe threat .
Post a Comment
हमें बताइए , आपको यह पोस्ट कैसा लगा ??