Professional Documents
Culture Documents
03 Laboratory Exercise 1
03 Laboratory Exercise 1
Members:
What is the article all about? Summarize the article in at least seven (7)
sentences.
The article by Hassan, N. is essentially about the potential risks we face when we go online
and how cyber threats have evolved over time. It explains that threats can range from damaging
your operating system to stealing your credentials and even tracking your online activities. These
threats are categorized into two main types: active and passive attacks. Passive attacks involve
monitoring a system and network communications, scanning for vulnerabilities, and collecting
information without altering data. On the other hand, active attacks use the information
gathered during a passive attack to compromise a user or network, modifying the intercepted
information to gain access or privileges. The article emphasizes that everyone is a potential target
online and that changing attitudes and understanding this is crucial to preventing cyberattacks.