Respuesta :
Answer:
It is called QUID PRO QUO BASED ATTACK
Explanation:
Step 1
Quid pro quid in latin stands for 'something for something'.Where an attacker or hacker offers their service for free and then in return asks for there password and some other vital information in other to provide more services.
But actually not users are concerned about their requirement because once attacker gets vital information the user will be exposed.
Step 2
To increase the chances of in his/her attack,attacker may use a VOLP telephone service that allows caller ID spoofing, thus the attacker can get all the information based on user's caller ID.
Answer:
1. Denial-of-Service
2. Traceback
3. Repudiation
4. Alteration
5. Masquerading
6. Eavesdropping
Explanation:
Denial-of-Service
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.
Traceback
In computing, a stack trace (also called stack backtrace or stack traceback[2]) is a report of the active stack frames at a certain point in time during the execution of a program. When a program is run, memory is often dynamically allocated in two places; the stack and the heap. Memory is continuously allocated on a stack but not on a heap, thus reflective of their names. Stack also refers to a programming construct, thus to differentiate it, this stack is referred to as the program's runtime stack. Technically, once a block of memory has been allocated on the stack, it cannot be easily removed as there can be other blocks of memory that were allocated before it. Each time a function is called in a program, a block of memory is allocated on top of the runtime stack called the activation record (or stack pointer.) At a high level, an activation record allocates memory for the function's parameters and local variables declared in the function.
Repudiation
A repudiation attack happens when an application or system does not adopt controls to properly track and log users’ actions, thus permitting malicious manipulation or forging the identification of new actions. This attack can be used to change the authoring information of actions executed by a malicious user in order to log wrong data to log files. Its usage can be extended to general data manipulation in the name of others, in a similar manner as spoofing mail messages. If this attack takes place, the data stored on log files can be considered invalid or misleading.
Alteration
Modification attacks also bring the great opportunity to simply create annoying situations and create internal discord within a company or organization. It could be the mixing of an argument into an outbound media stream as suggested in the scenario back in the introduction to the chapter. It could be mixing in the sound of an amusement park into the background of someone who is working from home. It could be dropping out random words from IM messages or adding in more words. Odds are that these types of attacks may not be perpetrated by an actual external attacker, but rather by someone inside the company intent on annoying or harassing other employees.
Masquerading
Definition - What does Masquerade Attack mean?
A masquerade attack is an attack that uses a fake identity, such as a network identity, to gain unauthorized access to personal computer information through legitimate access identification. If an authorization process is not fully protected, it can become extremely vulnerable to a masquerade attack.
Masquerade attacks can be perpetrated using stolen passwords and logons, by locating gaps in programs, or by finding a way around the authentication process. The attack can be triggered either by someone within the organization or by an outsider if the organization is connected to a public network. The amount of access masquerade attackers get depends on the level of authorization they've managed to attain. As such, masquerade attackers can have a full smorgasbord of cybercrime opportunities if they’ve gained the highest access authority to a business organization. Personal attacks, although less common, can also be harmful.
Eavesdropping
An eavesdropping attack, which are also known as a sniffing or snooping attack, is an incursion where someone tries to steal information that computers, smartphones, or other devices transmit over a network. An eavesdropping attack takes advantage of unsecured network communications to access the data being sent and received. Eavesdropping attacks are difficult to detect because they do not cause network transmissions to appear to be operating abnormally.