Friday, June 21, 2019

Solve the questions Assignment Example | Topics and Well Written Essays - 750 words

Solve the questions - Assignment Example2) The substance abuser is a critical trip of phishing prevention. What are two elements that might give away an attempt to pose as a financial site? One of the two elements is when a user does not use the HTTPS in the URL. This means that the website is not secured. Another way that the website may deemed as fake is when the URL changes. Many phishing scammers attempt to conduct this onrush by pasting their customized URL, which may consent different ending such as .net. In order to take a preventive action against this type of attack, it is essential to write the URL on the menu bar as it removes any discrepancy. Another element that it very vital is that the URL might ask for you to get along the software. However, this is a deception itself as it tries to run a .exe file. In any notification of running a .exe, this might be a clear casing of a fake website. 3) A browser can warn a user of a homeograph attack with a visual cue. Give an example describing a method that still allows the user to browse to a Chinese or Arabic site. Well, this case may be different. Arabic website utilizes right to left text so it may be clear that its a homographic attack. However, taking a case of Spanish website versus an American website, the discrepancy is harder to resolve. 4) Based on the edition in the book an attacker (most of the time) must learn about the database in order to attack with SQL snapshot. How can information be gathered without insider knowledge? SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. SQL although is a very useful language, can be very vulnerable against security. By conducting ad hoc queries, such as using a wildcard(*) symbol, hackers can obtain vital SSN or credit card numbers. Even if they acquire certain information, they have programs that can execute queries to utilize many permutations of a function to acquire the right com bination of information. 5) Why isnt input validation always make if it can mitigate the 1 cyber attack vector? Whose job is it? The problem with input validation is the fact that it can be utilized to conduct cyber attacks. gossip validation are result of bad programming errors To execute a buffer overflow attack, you merely dump as much data as possible into an input field. The attack is said to be successful when it returns an application error. Cross-site scripting attacks place malicious code, usually JavaScript, in locations where other users see it. Target field in forms can be addresses, bulletin board comments, etc. 1) Why is DNS considered one of the pillar application layer protocols? DNS is a pillar because all applications expect on DNS to provide authenticated binding between a name and the IP address. DNS also binds a name to unauthenticated IP addresss. Without DNS, SSL and TLS are not schematic and address authentication services verify the security sessions aft er the DNS connection. Without DNS the foundation of networking is not solidified. 2) Briefly describe the process for a DNS query. The first step in a DNS query process is that it requests information. Once the process has begun, the computers searches the local DNS cache to look for the address. If the address is not found, it performs a DNS query. Secondly, it asks the recursive DNS servers to contact ISPs recursive DNS servers. Since Recursive servers have their own caches, and the information is

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.