Cyber Security 1 - Ans
Cyber Security 1 - Ans
3- What’s Proxy ?
• Instead of connecting directly to a server A Proxy Server is a server application that acts as an
intermediary between a client requesting a resource and the response of the server providing the
resource.
5- What’s Spam ?
• Also known as junk mail, this is unsolicited email which often contains harmful malware, or
deceptive content
6- What’s Worm ?
• Computer worms are similar to viruses because they replicate and can cause the same type of
damage.
• Worms rplicate themselves by independently exploiting vulnerabilities in networks, they can slow
down networks as they spread from system to system.
7- What’s the types of Threat Actors and Hackers?
• Script Kiddies
• Vulnerability Brokers
• Cyber criminals
• State-sponsored
• Hacktivists
• White hat hackers
• Grey hat hackers
• Black hat hackers
8- Types of Attacks ?
• IP address spoofing
• Password-based
• Denial-of-service ( DoS )
• Man-in-the-middle attack ( MiTM )
• Sniffer attack
• Data modification