StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Solve the questions - Assignment Example

Cite this document
Summary
1)Session hijacking can be mitigated by making changes to the server – client credential process. Describe one of the methods. Session hijacking can be conducted in means of turning the source-routine off. In this scenario, the attacker is allowed to have access at point A on the network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Solve the questions
Read Text Preview

Extract of sample "Solve the questions"

Download file to see previous pages

2) The user is a critical part of phishing prevention. What are two elements that might give away an attempt to pose as a financial site? One of the two elements is when a user does not use the “HTTPS” in the URL. This means that the website is not secured. Another way that the website may deemed as fake is when the URL changes. Many phishing scammers attempt to conduct this attack by pasting their customized URL, which may have different ending such as .net. In order to take a preventive action against this type of attack, it is crucial to write the URL on the menu bar as it removes any discrepancy.

Another element that it very vital is that the URL might ask for you to upgrade the software. However, this is a deception itself as it tries to run a .exe file. In any notification of running a .exe, this might be a clear example of a fake website. 3) A browser can warn a user of a homeograph attack with a visual cue. Give an example describing a method that still allows the user to browse to a Chinese or Arabic site. Well, this case may be different. Arabic website utilizes right to left text so it may be clear that it’s a homographic attack.

However, taking a case of Spanish website versus an American website, the discrepancy is harder to resolve. 4) Based on the reading in the book an attacker (most of the time) must learn about the database in order to attack with SQL injection. How can information be gathered without insider knowledge? SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. SQL although is a very useful language, can be very vulnerable against security.

By conducting ad hoc queries, such as using a wildcard(*) symbol, hackers can obtain vital SSN or credit card numbers. Even if they acquire certain information, they have programs that can execute queries to utilize many permutations of a function to acquire the right combination of information. 5) Why isn’t input validation always done if it can mitigate the #1 cyber attack vector? Whose “job” is it? The problem with input validation is the fact that it can be utilized to conduct cyber attacks.

Input validation are result of bad programming errors To execute a buffer overflow attack, you merely dump as much data as possible into an input field. The attack is said to be successful when it returns an application error. Cross-site scripting attacks place malicious code, usually JavaScript, in locations where other users see it. Target fields in forms can be addresses, bulletin board comments, etc. 1) Why is DNS considered one of the “pillar” application layer protocols? DNS is a pillar because all applications depend on DNS to provide authenticated binding between a name and the IP address.

DNS also binds a name to unauthenticated IP addresss. Without DNS, SSL and TLS are not established and address authentication services verify the security sessions after the DNS connection. Without DNS< the foundation of networking is not solidified. 2) Briefly describe the process for a DNS query. The first step in a DNS query process is that it requests information. Once the process has begun, the computers searches the local DNS cache to look for the address. If the address is not found, it performs a DNS query.

Secondly, it asks the recursive DNS servers to contact ISP’s recursive DNS servers. Since Recursive servers have their own caches, and the information is

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Solve the questions Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1490151-solve-the-questions
(Solve the Questions Assignment Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1490151-solve-the-questions.
“Solve the Questions Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1490151-solve-the-questions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Solve the questions

Recreational Facilities for Ladies in Muslim Community

The underlying purpose of this study, “the plausibility of the recreational activities of Muslim women” necessarily requires an in-depth investigation into the status of the Muslim women in a society that is ultimately shaped and determined by the existent religion namely… In most cases, the underlying structure of a Muslim society appears to be patriarchal and male dominated....
29 Pages (7250 words) Research Paper

The Period of Tsarism in Russia

This paper 'The Period of Tsarism in Russia" focuses on the fact that Russo Japanese war broke out in 1904 and this resulted to the 1905 revolution in which most Russian military and naval forces were defeated.... During that time there was a shortage of food in most cities.... hellip; One Sunday many armament workers in a peaceful demonstration at winter palace in St Petersburg were massacred by Cossacks and this marked the beginning of the Russian revolution....
8 Pages (2000 words) Coursework

Types of Learning Target

They may write down the answers in an essay form or use the verbal form to solve the questions.... Through this, it helps to discuss the open-ended questions and also to understand the questions in depth.... Students use group discussion to discuss the difficult questions in order to find their solution (Stiggins, 2006)....
1 Pages (250 words) Essay

The Learning Process

Banking education refers to a term that was developed by Paulo Freire, for purposes of criticizing and describing the traditional concept of education.... The name is a metaphorical concept, and it is used to identify students as empty containers, and it is therefore the duty of… This results to the inability of students to think, and acquire or own knowledge that emanates from the learning process....
5 Pages (1250 words) Essay

Performance of tasks to improve English

The students attempt to fulfill the linguistic requirements while attempting to solve the questions; so the questions indirectly work to stimulate the language learning capabilities of students.... They have to use their previously learned language skills to answer the questions of the current task and then they are asked for justification....
2 Pages (500 words) Assignment

Questions and Problems Related to the Study of Consciousness

hellip; Will we ever solve the questions and problems related to the study of consciousness?... The essay "questions and Problems Related to the Study of Consciousness" attempts to review key developments in the study of consciousness, understand past and current theories and identify directions for further investigations and projects....
11 Pages (2750 words) Essay

Integration of Surveillance Technology into Strategies of State Control by Public Order in the UK

The essay "Integration of Surveillance Technology into Strategies of State Control by Public Order in the UK" focuses on surveillance as an observation from a distance used for transmitting the information to a particular common point.... It will unravel the extent to which, the public influences the integration process of surveillance technology in the UK....
9 Pages (2250 words) Essay

Rain Tank Required for Rain Water Harvesting, Water Consumption per Person, Sand Filters to Enhance Water Quality

… The paper “Rain Tank Required for Rain Water Harvesting, Water Consumption per Person, Sand Filters to Enhance Water Quality”  is a well-turned example of an assignment on technology.... Vol end =< Tank Volume, where Vol end-Volume remaining at the end month must be equal to or less than the tank volume, Vol end p= Volume remaining in the tank at the end of the previous month....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us