Respuesta :

Answer:

  • Botnets. A botnet is a network that combines various systems together to remotely take control over a victim’s system and distribute malware.
  • A denial-of-service (DoS) attack deliberately tries to cause a capacity overload in the target system by sending multiple requests.
  • In a Man-in-the-Middle (MiTM) attack, a hacker breaches the communication channel between two individual systems in an attempt to intercept messages among them.
  • Hackers use social engineering to manipulate people into giving up their sensitive information such as passwords and bank details.
  • Ransomware attacks have become one of the most notorious cyber threats. In this attack, a hacker uses malware to encrypt data that may be required for business operations. An attacker will decrypt critical data only after receiving a ransom.

Explanation:

ACCESS MORE