Page 78 - Demo
P. 78


                                    %u062c%u0645%u064a%u0639 %u0627%u0644%u062d%u0642%u0648%u0642 %u0645%u062d%u0641%u0648%u0638%u0629 %u0640 %u0627%u0625%u0644%u0639%u062a%u062f%u0627%u0621 %u0639%u0649%u0644 %u062d%u0642 %u0627%u0645%u0644%u0624%u0644%u0641 %u0628%u0627%u0644%u0646%u0633%u062e %u0623%u0648 %u0627%u0644%u0637%u0628%u0627%u0639%u0629 %u064a%u0639%u0631%u0636 %u0641%u0627%u0639%u0644%u0647 %u0644%u0644%u0645%u0633%u0627%u0626%u0644%u0629 %u0627%u0644%u0642%u0627%u0646%u0648%u0646%u064a%u062978- Spyware are small programs that install themselves on a computer to monitor user Web surfing activity and serve up advertising. - Key loggers record every keystroke on computer to steal serial numbers, passwords and launch Internet attacks. Denial -of-service attack An attack carried out by a hacker or hacker in order to disrupt a server's service in the network. Attacking Sent Information: It is the process of intercepting and tampering with messages sent from one party to another, such as e-mail messages. Full Hacking Attack Taking control of the victim's computer and tampering with all its files and data. Data protection methods. Technology (hardware) with poor security This is not at all related to the factor of %u201ctime%u201d and the obsolescence of equipment in technical terms, but in the methods of communication, and sometimes on the contrary; New technology may play a negative role in terms of safety! Outdated, or inefficient security software. Updating your security software is a core practice of the security concept, and it is a mandatory step to protect big data, as such software was developed to defend against %u201cknown%u201d threats, meaning that any malicious virus that infects an older version of security software will not be detected. Here it should be noted that most security software is designed to send alerts when hacking attempts occur, but those alerts are useless if no one is available to process them! Social engineering Cybercriminals know that traditional hacking techniques have an expiration date, so they have turned to non-technical methods, such as social engineering, that rely on social interaction and psychological manipulation to gain access to confidential data. The danger of this type of intrusion is that it is unpredictable and highly effective 
                                
   72   73   74   75   76   77   78   79   80   81   82