We have been working very hard since 2009 to facilitate in your learning Read More. We can't keep up without your support. Donate Now.

www.bit.ly/vucodes

+ Link For Assignments, GDBs & Online Quizzes Solution

www.bit.ly/papersvu

+ Link For Past Papers, Solved MCQs, Short Notes & More

The Different Forms of Cybersecurity Threats

  • Denial-of-service (DoS) Attacks 

    Hackers flood a network with requests to exhaust bandwidth. In many cases, DoS attacks are meant to be more of a nuisance than anything else.
  • Man-in-the-middle (MitM) Attack 

    This attack happens when hackers insert themselves into a two-party communication. Once they’re in, they can steal data.
  • Phishing Attacks 

    Phishing uses fake emails and text messages to get people to give hackers access to private information. It is one of the most regular attacks, especially against the general public.
  • Malware

    This attack method is broken down into spyware, ransomware, worms, and viruses. Emails or downloads usually deliver these attacks from suspicious sites.
  • SQL Injection Attack

    Hackers insert malicious code onto an SQL-using server, usually via a vulnerable website search box. Once carried out successfully, the attack lets the hacker see information otherwise kept off-limits.
  • Password Attack 

    Just what it sounds like. Hackers try to crack a password, usually a poorly chosen one and gain network entry.


+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)

+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)

+ Click Here to Search (Looking For something at vustudents.ning.com?)

+ Click Here To Join (Our facebook study Group)


Views: 13

Comment

You need to be a member of Virtual University of Pakistan to add comments!

Join Virtual University of Pakistan

Looking For Something? Search Here

Latest Activity

HELP SUPPORT

This is a member-supported website. Your contribution is greatly appreciated!

© 2020   Created by +M.Tariq Malik.   Powered by

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service

.