What are the categories of firewall attacks?

What will be an ideal response?


Firewall attacks can be organized into three categories:* Spoofing-In this type of attack, the hacker appears as a legitimate user, which allows the hacker to send and receive packets to and from a network.* Session hijacking-In this type of attack, the hacker intervenes in an active session. First, the hacker forges the identity of a host or a client. Next, the hacker ends the session of the user whose IP address has been forged by using session-ending packets. Then, the hacker continues the session and performs the hacking operations.* Denial of service-In this type of attack, a hacker floods the target server with a large number of packets. As a result, the server is unable to communicate and respond to the requests sent by valid clients.

Computer Science & Information Technology

You might also like to view...

Modify the LNPR algorithm such that it can be implemented when a set of bridge links is present in the network. Here, a bridge link means that one end of the link must be connected to a pendant node.

What will be an ideal response?

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The smallest data item in a computer can assume the value 1 or the value 2. Such a data item is called a bit (short for “binary digit”—a digit that can assume either of two val- ues). 2. The Unicode character set is a popular subset of ASCII that represents uppercase and lowercase letters, digits and some common special characters. 3. Each of the following is a form of computer output: data displayed on screens, printed on paper, played as audio or video on PCs and media players, used to control other de- vices, such as robots, 3D printers and “intelligent” appliances. 4. Reuse helps you build more reliable and effective systems, because existing classes and components often have gone through extensive testing, debugging and performance tuning. 5. One of the W3C’s primary goals is to make the web universally accessible to everyone regardless of disabilities, language or culture.

Computer Science & Information Technology

PC stands for ____ computer.

A. peripheral B. personal C. processor D. portable

Computer Science & Information Technology

The disk drive inside your computer is called the ________ drive

A) ARM B) hard C) GUI D) permanent

Computer Science & Information Technology