Which three of the following types of cyber attacks may occur in the process of mobile banking? a) Backdoor attack b) Front door attack c) Denial of service attack d) Direct access attack Choose the correct option from those given below:

Which three of the following types of cyber attacks may occur in the process of mobile banking? a) Backdoor attack b) Front door attack c) Denial of service attack d) Direct access attack Choose the correct option from those given below: Correct Answer a), c) and d)

the following are the types of cyber-attacks that may occur in the process of mobile banking:

1. Backdoor attack:

  • A backdoor is a malware type that negates normal authentication procedures to access a system.
  • As a result, remote access is granted to resources within an application, such as databases and file servers, giving perpetrators the ability to remotely issue system commands and update malware.

2. Denial of service attack:

  • A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users.
  • DoS attacks accomplish this by flooding the target with traffic or sending it information that triggers a crash.

3. Denial of service attack:

  • A direct-access attack is an attack where a hacker is able to gain access to a computer and be able to directly download data from it.
  • They will be able to compromise security by modifying that software and adding key loggers, worms, etc.
  • Eavesdropping is listening to a private conversation between hosts and networks.

1. Front door attack:

  • A front door attack is a kind of cyber attack where the user gets tricked into opening such websites or URL links that open the front door for viruses. 
  • All front-door attacks require the actions of the user to allow the virus to infect the system.
  • This is why they are referred to as a front-door attack, as metaphorically, the user is tricked into opening the front door and letting the virus in. 
  • These types of attacks are not possible in mobile banking. 

Thus, option 4 is the correct answer.

Related Questions

In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.
The question given below consists of a statement, followed by three arguments numbered I, II and III. You have to decide which of the arguments is/are ‘strong’ arguments and which is/are ‘weak’ arguments and accordingly choose your answer from the alternatives given below each question. Statement: A shortage of bank branches and ATMs across India’s hinterland is holding back Prime Minister Narendra Modi’s financial inclusion efforts and risks angering rural voters ahead of elections next year. After taking office in 2014, Modi set an ambitious target to open a bank account for every household to ensure welfare funds flow directly to India’s poor, while improving access to credit and insurance programs. He pushed policies that helped bring 310 million people into the formal banking system in just four years, according to the World Bank. Based on the arguments stated below and he information stated above, which of the following arguments state the reason for the problem, ‘But many of India’s villages still lack bank branches or ATMs to help service new customers, while the pace of building new financial infrastructure has actually slowed’.  Arguments: I. Because Modi’s government effectively forced poor citizens into the banking system by linking some welfare benefits to bank accounts, villagers have ended up stuck in long queues and struggling with ATMs that often run out of cash or break down.  II. With an election due next year, the mismatch between the government’s policies and the rural banking system is generating frustration among a key slice of India’s electorate. III. The banking system struggled to keep up, while some gains proved temporary. Nearly half of Indian bank accounts were inactive in 2017, meaning they weren’t used at all in the previous 12 months