Final answer:
A phishing attack involves sending malicious emails to deceive recipients, while ransomware encrypts files to demand payment for decryption. A DDoS attack aims to disrupt service by overloading a network, and malware consists of software that intends to harm computer systems.
Step-by-step explanation:
To match the type of computer-based attack with its description or example, one must understand the fundamental characteristics of different types of cyber threats. Here's how they can be matched:
- a) Phishing - Sending malicious emails to trick recipients
- b) Ransomware - Encrypting files and demanding payment for decryption
- c) DDoS (Distributed Denial of Service) - Overloading a network to disrupt service
- d) Malware - Software designed to harm computer systems
Hackers use various methods to execute these attacks, from deceptive emails that appear legitimate to solicit personal information to using ransomware to lock files and demand payment. Cyber threats like DDoS attacks overload networks and services, making them inaccessible to legitimate users. Malware, a general term for malicious software, encompasses any program intended to damage or disable computers and computer systems. Governments and other groups may use these attacks to disrupt services or steal sensitive information, which can lead to chaotic situations and spread disinformation. Such tactics are part of the darker side of technology and are significant considerations in the field of information technology, contributing to the broader challenge of protecting against data breaches and cyber-attacks.