0% found this document useful (0 votes)
4 views

chapter1part2

Uploaded by

mostafahelmy2018
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

chapter1part2

Uploaded by

mostafahelmy2018
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Q1. What is DoS Attack? What are the general symptoms?

DoS: is an Internet security -related event in which the hackers attack a


particular server running some Internet services to prevent it from working
normal or to stop the services. In this case, the servers are overwhelmed with the
flooding of superfluous messages.

The general symptoms: Inability in accessing a website • Delay in accessing


online service • Huge delays in file opening on the websites • Increased volume of
spam emails .

Q2. What is the difference between DoS and DDoS attack?


The main difference between DoS and DDoS attacks is that the DoS attack is
targeted from a specific origination of traffic to attack the victim server, while in
the DDoS attack case, multiple sources of traffic are used to attack the victim
server (at the same time).

Q3. What is MITM?


The hacker intercepts the normal connection between the user and the web
server without any knowledge of both user and server. The legitimate
communication link between the two entities is exploited, intercepted, and
decrypted to steal the personal information for malicious use.

Q4. What is Crypto jacking?


is a new form of cyber-attack to be used for stealing the “crypto currency”. This
attack mines processor’s power through malicious software on the crypto
currency miner machines of the legitimate users

Q5. Why could cyber stalking be dangerous? Explain.


Because Cyber stalking is a type of cybercrime that uses the internet and
technology to harass or stalk a person and it might take place:

• Posting offensive, suggestive, or rude comments online


• Sending threatening, lewd, or offensive emails or messages to the victim

• Joining the same groups and forums as the victim

• Releasing the victim’s confidential information online

• Tracking all online movements of the victim through tracking devices

You might also like