8 Serangan Siber Tertinggi - 2024
- Phising Attack - The use of deceptive emails, texts, or websites to gain sensitive information.
- Ransomware - Malware that can encrypt data and make you pay to get them back.
- Denial-of-Service (DoS) - Loading excessive load on a machine or network so that it stops working normally.
- Man-in-the-Middle (MitM) - Engaging in covert interception and manipulation of communication between two parties without noticing it.
- SQL Injection - To get the access to the database, Vulnerabilities in Database queries can be exploited.
- Cross-Site-Scripting (XSS) - Putting malicious code into websites that other people visit.
- Zero-Day Exploits - Attacks take advantage of unknown vulnerabilities before programmers can fix them.
- DNS Spoofing - Sending DNS queries to malicious sites so that they can be accessed without permission.
Keywords: Sustainable Development Goals (SDG) 9, Industry, Innovation.
Comments :