Css :- motivationbank.net






Question:- 

 Discuss error 404 hacking digital India part 1 chase .

 Answer :- 

1. In error 404 hacking digital India part 1 chase , the cyber crime and cyber attacks hack the information of users like bank detail and personal information 

 2. It is real time incident . In this , attacker or hacker creates an attractive video so that victim gets attracted and plays that video into system . 

 3. When we clicked on video to play then at the time of buffering , hacker can know our current location and GPS history but also have complete access to our contacts , text messages , Facebook , Whatsapp and most importantly our bank details , including our CVV number


4. Hackers are creating a kind Trojan file , and android apk files . The apk files that will be distributed all over the internet . Those who download this file will be hacked easily 


5. Potential cyber attacks that is most common in error 404 hacking :  


A ).Web Application attacks : 

.i.) A web application is a client - server computer program which uses web browsers and web technology to allow its visitors to store and retrieve data to / from the database over the internet . 


ii ). If there is flaw in the web application , it allows the attacker to manipulate data using SQL injection attack . 


B. ). Network security attacks : 


i ).Network security attacks are unauthorized actions against private , corporate or governmental IT assets in order to destroy them modify them or steal sensitive data . 


ii ). As more enterprises invite employees to access data from mobile devices , networks become vulnerable to data theft or total destruction of the data or network . 


C). Mobile security attacks : 

 I ). Mobile security , or mobile device security , has become increasingly important in mobile computing . 


ii). The security of personal and business information now stored on smartphones . 

iii ). More and more users and businesses use smartphones to communicate , but also to plan and organize their users ' work and also private life . 


iv). Within companies , these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks . 


V). Indeed , smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company .


    Question :- 

    How can we defend zero - day vulnerabilities ?


     Answer :- 

    1. A zero - day vulnerability is a computer software vulnerability that is unknown to , or unaddressed by , those who should be interested in mitigating the vulnerability ( including the vendor of the target software ) .  


    2. Until the vulnerability is mitigated , hackers can exploit it to adversely affect computer programs , data , additional computers or a network . 


    3. An exploit directed at a zero - day is called a zero - day exploit , or zero - day attack .


     4. The term ' zero - day referred to the number of days since a new piece of software was released to the public . So , ' zero - day ' software was software that had been obtained by hacking into a developer's computer before release . 


    5. The term was applied to the vulnerabilities that allowed this hacking , and to the number of days that the vendor has had to fix them . 


    6 . Once the vendor learns of the vulnerability , the vendor will usually create patches or advise workarounds to mitigate it . 


    7. The more recently that the vendor has become aware of the vulnerability , the more likely that no fix or mitigation has been developed . 


    8. Even after a fix is developed , the fewer the days , the higher the probability that an attack against the afflicted software will be successful , because not every user of that software will have applied the fix . 


    9. For zero - day exploits , unless the vulnerability is inadvertently fixed , For example , by an unrelated update that happens to fix the vulnerability , the probability that a user has applied a vendor - supplied patch that fixes the problem is zero , so the exploit would remain available . Zero - day attacks are a severe threat .

    Post a Comment

    हमें बताइए , आपको यह पोस्ट कैसा लगा ??