Name the technique used in security attacks.
What will be an ideal response?
There are numerous techniques used in security attacks and experts use different terminology to
describe them. According to textbook we can list the following problems:
? Wiretapping: Making a copy of packets as they traverse a network to obtain information
? Replay: Sending packets captured from a previous session
? Buffer overflow: Sending more data than a receiver expects in order to store values in
variables beyond the buffer
? Address Spoofing: Faking the IP source address in a packet to trick a receiver into processing
the packet
? Name Spoofing: Using a misspelling of a well-known name or poisoning a name server with an
incorrect binding
? DoS and DDoS: Flooding a site with packets to prevent the site from successfully conducting
normal business
? SYN flood: Sending a stream of random TCP SYN segments to exhaust a receiver’s set of TCP
connections. This can be considered a sub-category of DoS and DDoS attacks
? Key Breaking: Automatically guessing a decryption key or a password to gain unauthorized
access to data
? Port Scanning: Attempting to connect to each possible protocol port on a host to find a
vulnerability
? Packet interception: Removing a packet from the Internet which allows substitution and man-
in-the middle attacks
You might also like to view...
Answer the following statements true (T) or false (F)
1. Value checks are usually performed for any data. 2. A value check is used when one element has a relationship with another one. 3. A mathematical process of assuring data accuracy involves multiplying each of the digits in the original code by some predetermined weights, summing these results, and then dividing this sum by a modulus number. 4. Use the stored data system to prevent the mistake that the intended number 53411 is typed in as number 54311 instead. 5. A method for validating credit cards uses a check digit formula called the Kendall formula.
Employees' last names would usually make an appropriate primary-key field
Indicate whether the statement is true or false
The page number will display ________ of the footer area
A) on the left side B) on the right side C) at the top D) in the center
Facebook's video chat feature is powered by Google
Indicate whether the statement is true or false