In: Computer Science
What are device control threats? and a few examples.
(ANS) Some of the device control threats are given below:
(1)Application-based threats :
(a)These types of threats occur when the user download the application.
(b)The application looks very normal similar to other applications, but once the user starts using the application then the skimming of user's data takes place.
(c)For example the spyware and malware attacks, stole the business information without any notice of the user.
(2)Web-Based threats:
(a)These types of threats are mostly found in the web applications.
(b)When the user tries to visit the affected website, in the frontend everything looks normal but after visiting the website, it adds certain malicious content on the user's device.
(c)These malicious content are very dangerous to the user's security.
(3)Network based Threats:
(a)Therse are generally called as the cyber attacks.
(b)When the user uses the public WIFI network, these cybercriminals steals the unencrypted data.
(4)Physical Threats:
(a)These threats occur when the user looses the device and these hackers has direct access to this device hardware where certain confidential information is been stored.
(b)These types of threats are dangerous to the enterprises.
Examples of device control threats:
(1)Inactive apps.
(2)Spyware
(3)Malicious apps.
(4)Botnets.
(5)Phishing attacks.