COS0013-LAB TEST 1
1. What is a “honeypot”?
It is a trap set in computer system is used to detect unauthorized access and to collect information regarding intruder or attacker in the system. Honeypot is considered as one of the security technique used in the computer to trap the attacker.
2. What is “blackholling”?
Blackholling is used to stop the denial of attacks and malware based attacks. It is a technique used by the internet service providers to block the data coming from certain ip addresses. This is technique can be also used in personal networks.
3. What is “air-gap security”?
It is a network security measure used in computer networks to ensure that the secure network physically protected from other unprotected networks. This
…show more content…
In 1989 Clifford Stoll wrote a book called “The Cuckoo’s Egg”. Explain the relevance of the book’s title?
In the book context it is a malware program that an attacker uses to replace a legal program. It is like a cuckoo bird laying it's eggs in another bird's nest. The cook bird does not lay eggs in its nest.
17. Define dictionary attacks and brute force attacks .How ere they similar and different?
A dictionary attack is a technique used to break the computer security of a password-protected machine or server by systematically entering each word in dictionary as a password. A brute force attack is a trial-and-error method used to obtain secret information such passwords.
In brute force attack it tries all possible key combination to find the password. But dictionary attack uses only the known word. In brute force attack it is easy to crack when the key length is small. If the password is common then it is to crack by using dictionary attack.
18. Explain the difference between penetration test and a security audit?
The goal of penetration test is to find the security flaws in the system by intentionally attacking the system. It is goes deeper by stealing the data to find the vulnerabilities. Security audit is the evaluation of security of a company with certain baseline. The goal of security audit is to ensure all security techniques are working well in the
Kesey, Ken. One Flew over the Cuckoo's Nest, a Novel. New York: Viking, 1962. Print.
Kesey, Ken. One flew over the cuckoo's nest, a novel. New York: Viking Press, 1962. Print.
Kesey, Ken. One Flew Over the Cuckoo’s Nest. The Viking Press. New York. 1973. Page 188.
Kesey, Ken. One Flew over the Cuckoo's Nest. Ed. John Clark Pratt. New York: Viking-Penguin, 1996. Print. Viking Critical Library.
Blackhole attack is another type of DoS attack that generates and disseminates build routing information. As mentioned in [20], a attacker, exploiting the flooding based routing protocol, advertises itself as having a valid shortest route to the destined node. If the atacker replies to the requesting node before the actual node replies, a bogus route will be created. Hence packets are not forwarded to the certain destination node; instead, the attacker intercepts the packets, drops them and thus, attracts network traffic [21].
The Denial of Service attack (DoS), in this attack, the attacker does not actually access the system, but rather simply blocks access from legitimate users. In the words of the CERT (Computer Emergency Response Team) Coordination Center (the first computer security incident response team), “A ‘Denial-of-Service’ attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service” (CERT, 2003). One often-used blocking method is flooding the targeted system with so many false connection requests that it cannot respond to legitimate requests. DoS is an extremely common attack method, second only to malware. (Easttom, 2014)
few might wonder what it does and then move on. The hacker, the true hacker,
Cybersecurity is the technology that protects computers and networks from unauthorized personnel. Ever since computers have expanded to homes and the workplace; the need for cyber security has grown exponentially. Millions of people around the world have access to the internet at a given time, and this allows for predators to attack, scam, hack, and intrude on personal and government information. Cybersecurity is designed to counteract these attempts to ultimately allow for safe networks and computers.
In Computer security terminology Hacker is a person or group of persons, who exploit, modify and identify weakness in a computer system or network. Hacker may be motivates of reasons such as profit, protest and challenge. based on attitude, belief, and goals hacker groups are categories such as
occurs when a rogue BGP peer maliciously announces a victim's prefixes in an effort to reroute
What is the “MALWARE”? A malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "bad ware" .Malware includes viruses, worms, Trojan horses, and spyware. Viruses, for example, can cause havoc on a computer's hard drive by deleting files or directory information. Spyware can gather data from a user's system without the user knowing it. This can include anything from the Web pages a user visits to personal information, such as credit card numbers.
Malicious software in short known as Malware. It is also known as computer Contaminant. Similar to biological parasite, malware also reside in a Host. Malware will get installed on host without user’s consent. Generally a software is considered malware based on the intent of the creator...
Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help to stop unauthorized users or intruders from accessing any part of a computer system. Detection helps one to determine whether or not someone attempted to break into a computer system, if they were successful, and what they may have done.
dictionaries by the learners is helpful to collect data. This enables the learners to know how the language of the vocabulary has been structured. Nuttall has (2000,) argued that “it is wasteful to look up every new word because many of students use dictionary far too much”. Regardless of this point of view, dictionary is considered to be a great aid for students to know how each word related to each other and figure out the part of speech for any words
.... Firewalls can easily be implemented in both hardware and software, or both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. It works like security guard at the door checking all messages entering or leaving the intranet, which examines each message and blocks those that do not meet the specified security criteria.