1. Examples of system threats that may cause damage to a system:
- Distributed denial-of-service (DDoS) attacks: These attacks overwhelm a system or network with a flood of incoming traffic, making it unavailable to users.
- Malware or viruses: These malicious software programs can infect a system, disrupt operations, steal sensitive data, or cause damage to files.
Examples of program threats that may cause damage to a system:
- Buffer overflow vulnerabilities: These occur when a program receives more data than its allocated memory space, potentially allowing an attacker to execute arbitrary code or crash the program.
- SQL injection attacks: These involve inserting malicious SQL statements into a program's input fields, leading to unauthorized access, data breaches, or data manipulation.
2. Two ways to secure your system from system or program threats:
- Keep software and operating systems up to date: Regularly applying security patches and updates helps protect against known vulnerabilities that can be exploited by threats.
- Use strong and unique passwords: Implementing complex passwords and using different ones for each account reduces the risk of unauthorized access or account compromise.
3. Three ways to spot social engineering attacks:
- Be cautious of unsolicited requests for information: If someone you do not know or were not expecting asks for sensitive information, such as passwords or financial details, it could be a red flag.
- Verify the source and legitimacy of communications: Double-check the sender's email address, phone number, or website URL to ensure they are genuine. Phishing emails or fake websites often mimic trusted sources.
- Exercise skepticism with urgent or high-pressure tactics: Social engineers often use urgent or pressing situations to manipulate individuals into bypassing security measures. If someone is trying to rush or pressure you into providing information or taking immediate action, exercise caution.
1. List two examples of system and program threats that may cause damage to a system
-System threat
-Program threat
2. Write two ways you can secure your system from system or program threats
3. As you know. human security attacks are made via social engineering List any three ways you can spot social engineering attacks
1 answer