Nt1310 Unit 3 Email Attack

Words: 1510
Pages: 7

Task 1

E-mail :

There are many advantages in email use, but also not without negative influences. One of the most important disadvantages of e-mail is the phantom and deceptive advertisements that shade the user to enter his or her personal data and credit card data.
There are also people who send fake pages for the user to enter his data or his password and then the sender (hacker) steal his accounts . Also some messages containing malicious attachments, such as viruses, disable the recipient's device, destroy it, or steal recipient data and images.

Workspace :

There are many employees who use their powers to access data and leak it out of the work place, either financially or without pay, intentionally or unintentionally. It also
…show more content…
Task 3

Hackers attacks :

1. Virus, Trojan etc. :
Virus or Trojans are malicious programs which get installed into the victim's system and keeps sending the victims data to the hacker (1) . They can disable your devices, encrypt or delete your data, and are self-replicated as you copy themselves and spread to all devices connected to your computer.

: 2. Denial of Service (DoS\DDoS)
The process of strangling the server or site by dumping it with data until it becomes slow or hangs.

3. Phishing :

Where the hacker design and send fake pages to the victim and once the victim logged on the fake page hacker hack his accounts after the Trojan horse installed on the page to send information and passwords to the hacker.

4. Key logger :

Is a simple program that records the sequence of the keyboard in your device and saved in a special file in your computer, so that when you enter your accounts and passwords is recorded and sent to the hackers, for this reason most of the banking sites force you to use the virtual keyboard in their website.

Cyber bullying
…show more content…
Cyber stalking :

And is known to pursue or harass a particular individual, group or entity. Where the attacker threw false accusations, defamation and spreading rumors. The attacker may monitor, steal identity, threaten, sabotage or gather information that may be used for threats, embarrassment or harassment. The attacker may use the hackers to gather personal data for the person to threaten and harass him to get a goal or without any goal.

Cyber terrorist :

Cyberterrorism is the use of the Internet to conduct violent acts that result, loss of life or significant bodily harm, in order to achieve political goals through intimidation . The Electronic Terrorist spreads viruses, trojans, worms, etc. to the networks or devices that target the data. Experienced cyberterrorists, who are very skilled in terms of hacking can cause massive damage to government systems, hospital records, and national security programs, which may leave a country or organization in panic and fear of another attack (2) .

Task 4

Password and Email cracking techniques :
1. Dictionary attack