A computer system is a collection of hardware and software components designed to provide an effective tool for computation. Computer system are used in every walk of life to assist us in the various tasks we perform. The wide availability of the internet has enhance the use of computer for information sharing and communication. Computer system allows us to store, process, display and communicate information. In any modern computer system even a simple one, in general needs several different programs in order to accomplish its various functions.

Monday, November 7, 2016

Direct Attack hacking

Hacker is a term that applies to anyone who writes computer program code. Cracker is a term that applies to people who use their skills to attempt to access other computer without permission.

There are even programs shared across the internet, allowing people with less skill to mount an attack. Broadly, two types of attacks can be considered: indirect attack and direct attack. A direct attack is a hacker using a personal computer to break into syst

Direct attacks are performed at the sensor level outside the digital limits of the system and therefore, no digital protection mechanism can be used against it.

Direct attacks originate from the threat itself. It would take the form of hacking into a computer system and rewriting or stealing information. This would have a great impact on organizations offering on-line services, since these on-line services could be damaged, modified or destroyed.

Neither problem is that of the organization were not able to determine where the security risk lies, the direct attacks would be re-occurring.

In a direct attack an imposter can either change his biometric characteristics in order to evade identification or claim an authorized user’s identity by simply posing himself or by presenting a falsified biometric trait of that user.

The impact of the attacks would be to publicize the hackers and destroy the credibility of the organization offering the on-line services especially to current and future customers.
Direct Attack hacking
Related Posts Plugin for WordPress, Blogger...

The Most Popular Posts