answersLogoWhite

0

AVG anti-viruses is a very good program that protects you from hackers and viruses. Also zonealarm is very a good program it is a firewall and a anti-viruses program.

In terms of software development the answer is more complex. A large number software security issues can be mitigated by performing proper input validation.

User Avatar

Wiki User

16y ago

What else can I help you with?

Continue Learning about Engineering

How can web tools such as java or ActiveX be used for malicious attack?

by installing unwanted programs on a computer


What type of self-replicating program uses a scripting engine to attack?

The type of self-replicating program that uses a scripting engine to attack is called a worm. This is a type of computer virus.


What is a teardrop in computer terms?

A DoS attack where fragmented packets are forged to overlap each other when the receiving host tries to reassemble them.


Can a cross-site scripting attack coded in javascript access your cookies?

In short: Yes, a cross-site scripting attack (XSS) can be used to access cookies. This is a big part of the reason why you shouldn't rely solely on cookies to identify a user. In 2006, LiveJournal was a victim of just this style of attack. You can read about it in detail in the related links. Since then, browsers have implemented security measures making this kind of attack far more difficult to implement (but not impossible.)


Which kind of attack is most often attributed to programming errors?

The most common type of attack attributed to programming errors is the SQL Injection attack. This occurs when an application improperly sanitizes user inputs, allowing attackers to manipulate SQL queries and gain unauthorized access to the database. Such vulnerabilities often arise from a lack of proper input validation and inadequate security measures in web applications. Consequently, SQL Injection can lead to data breaches, data manipulation, and even complete system compromise.

Related Questions

What type of security attack is being launched when a hacker calls to gain computer login information and pretends to be an employee?

Social Engineering


What has the author Salvatore J Stolfo written?

Salvatore J. Stolfo has written: 'Insider attack and cyber security' -- subject(s): Cyberterrorism, Computer hackers, Computer networks, Computer crimes, Congresses, Computer security, Security measures, Prevention


A measure for preventing a social engineering attack except?

Create a strong cybersecurity awareness program that educates employees about common social engineering tactics and how to identify and respond to them effectively. Regularly remind employees to be cautious about sharing sensitive information and to verify the identity of anyone requesting information. Implement multi-factor authentication and access control measures to add an extra layer of security to sensitive systems and information. Conduct regular security assessments and simulations to identify vulnerabilities and gaps in your organization's defenses against social engineering attacks.


What has the author Adam Cobb written?

Adam Cobb has written: 'Australia's vulnerability to information attack' -- subject(s): Security measures, Computer security, Access control, Computer networks, Computers, Information networks


When a face up defense position monster is switched to attack mode can it still attack?

Unless there is a card effect preventing it, it can attack.


What is social engineering'?

A Social Engineering attack is any attempt to get someone to divulge private information.


What is social engineering?

A Social Engineering attack is any attempt to get someone to divulge private information.


What is a computer attack?

A computer attack is basically either when a hacker is on your computer doing things that you can do. Or it can be a Virus


What guidelines is a measure for preventing a social engineering attack?

Guidelines for preventing a social engineering attack include implementing thorough employee training programs to increase awareness of potential threats, enforcing strict password policies to ensure secure access to sensitive information, regularly updating security software and systems to protect against evolving tactics, and implementing multi-factor authentication to add an extra layer of security against unauthorized access. Additionally, establishing clear protocols for verifying identities and information before sharing sensitive data can help mitigate the risk of falling victim to social engineering attacks.


What is Zap Attack?

Zap Attack was an early computer game (1984) on the Sinclair ZX81. Zap Attack is also a generic term for programmed attack sequences as parts of edited computer games.


What is an explanation of the deterrence theory?

preventing an attack by threatening retaliation against the potential attacker


Are you allowed to kill people that attack you?

Your defense should be measures and proportionate.