Hacking techniques and Counter Measures Please find the usag

Hacking techniques and Counter Measures.

Please find the usage and the required counter measures to avoid effects of the below commands. (PLEASE USE SCREEN SHOTS IF POSSIBLE)

d. Nmap

Solution

Hacking

1)system probing and fingerprinting tools:These tools secretly collect data about our computer hardware and software and send the data back int the attacker.we will not not know about this attack.

2)stealing cookies which contains information about what we browse on net ,monitoring and taking control over them

3)tricking with file names and making us to visit some potentially harmful file controlled by hacker.these files inturn invade our computer and take control of activities

4) by using fake wireless access point

5)bait and switch:here we download the data which is not our file,we dont undertand because it will look like our file

counter measures.

1)paid internet security softwares with antivirus

2) install of anti spywares and anti malwares

3)all popup blockers.

4)online email attachment scanners

5)Illegal website blockers

6)by avoiding install unknown unlicences softwares

7)system activity monitoring softwares

Hacking techniques and Counter Measures. Please find the usage and the required counter measures to avoid effects of the below commands. (PLEASE USE SCREEN SHOT

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site