Respuesta :
Normally, the attack comes from an intruder who already studied the victim's behavior.
> The attacker can create a database from the history of browsing of the possible victim and then create an attack based on the victim's behavior of browsing.
> If the attacker has access to the user directory he can put the executables files in those folders.
> If the wi-fi is not secured, the attacker can check the network in order to spread a possible worm.
It is possible to see that are several ways which the attacker can use in order to obtain more information from the victims. But that depends on how deeply the attacker studied the victim.
If an attacker had watched the behaviors of the users on the computer and has plans to attack, they can:
What is an intruder in cyber security?
The person called an Intruder is known to be a kind of online vulnerability scanner that is said to be a form of cyber security weaknesses that a person may have an exposed systems and data breaches.
Learn more about attacker from
https://brainly.com/question/24956493
