SlideShare a Scribd company logo
1 of 2
Download to read offline
Answer each of the questions below with a few sentences. Be brief, but fully explain your
answer.
1. Explain what is an IPSweep and a PortSweep type of attack?
2. In a few words, explain what are buffer overflow attacks?
3. Describe and explain Denial of Service (DoS) and Distributed Denial of Service (DDoS)
network attacks.
4. Briefly describe what are routing attacks. Provide two examples, highlighting their main
characteristics.
5. What countermeasures would you recommend to defend against these types of attacks?
Solution
1. IPsweep: The function ipswep attack is used to determine how many devices are connected to
the network and check what services these devices are running.
portsweep: The portsweep supports many ports to know which services provided to a single host.
The port is not opened until it supports three way hand shake.
2. it is discovered in hacking circles. This is not risky application even the iput strength is not
good. it must access by the administrator and the output comes from the way the input is
implemented.
3. Denial of services attack : it is a one of the cyber attack. In this the hackers doesn't enter into
your website it just unavailable your site to the user and make your website as a malcious
website. There by it take down the security firewall.
Distributed Denial of services attack: It mainly focuses on the multiple devices it is same as the
Denial of service attack.
4. Routing attack is one of the main problem in security breach because the router sends the data
in the form of packets so attackers mistreat those packets means they change the data or
information and sends. and the hackers sends the malcious packets to the router there by the
router gets affected and they can easily breachg into the router.
Ex: Consider an organizatiopn using a router the data that is sent by router in the form of
packets and these packets data when ever hacked by the hackers due to less security they change
the packet data and sends back there by wrong information is registered so the adminstrator has
to provide some security and authentication to the router.
5. To work against the hackers we must take active measures to defend against these attacks, The
information that is sent by the attackers or hackers must not be opened in our systems so that we
have to take care of not opening those keep secured with highly authentication and the password
should not be in common way it has to be difficult so they cannot expect to be so. Avoid over
writing the addresses.Be activity at time when suddenly if any thing wrong happens we must be
in a position to handle and manage the problem because it causes more damage when time runs.

More Related Content

Similar to Answer each of the questions below with a few sentences. Be brief, b.pdf

1 ijaems sept-2015-3-different attacks in the network a review
1 ijaems sept-2015-3-different attacks in the network  a review1 ijaems sept-2015-3-different attacks in the network  a review
1 ijaems sept-2015-3-different attacks in the network a reviewINFOGAIN PUBLICATION
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxSuhailShaik16
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxhealdkathaleen
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & AttacksNetwax Lab
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection toolsvishalgohel12195
 
04-post-connection-attacks.pdf
04-post-connection-attacks.pdf04-post-connection-attacks.pdf
04-post-connection-attacks.pdfxasako1838
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewRobert Herjavec
 
Recognizing security threats
Recognizing security threatsRecognizing security threats
Recognizing security threatsKishore Kumar
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYijasa
 
PROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKS
PROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKSPROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKS
PROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKSIJSRD
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???trendy updates
 
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network  Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network IJECEIAES
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxkarthikvcyber
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Threats in network that can be noted in security
Threats in network that can be noted in securityThreats in network that can be noted in security
Threats in network that can be noted in securityssuserec53e73
 

Similar to Answer each of the questions below with a few sentences. Be brief, b.pdf (20)

1 ijaems sept-2015-3-different attacks in the network a review
1 ijaems sept-2015-3-different attacks in the network  a review1 ijaems sept-2015-3-different attacks in the network  a review
1 ijaems sept-2015-3-different attacks in the network a review
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
04-post-connection-attacks.pdf
04-post-connection-attacks.pdf04-post-connection-attacks.pdf
04-post-connection-attacks.pdf
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR Overview
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
Recognizing security threats
Recognizing security threatsRecognizing security threats
Recognizing security threats
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
 
PROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKS
PROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKSPROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKS
PROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKS
 
Network Security R U Secure???
Network Security R U Secure???Network Security R U Secure???
Network Security R U Secure???
 
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network  Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
 
Network seurity
Network seurityNetwork seurity
Network seurity
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Threats in network that can be noted in security
Threats in network that can be noted in securityThreats in network that can be noted in security
Threats in network that can be noted in security
 

More from shalini518936

Answer the followingHow would you find the normal approximation t.pdf
Answer the followingHow would you find the normal approximation t.pdfAnswer the followingHow would you find the normal approximation t.pdf
Answer the followingHow would you find the normal approximation t.pdfshalini518936
 
answer the following questions in brief paragraph form 1 what is GAA.pdf
answer the following questions in brief paragraph form 1 what is GAA.pdfanswer the following questions in brief paragraph form 1 what is GAA.pdf
answer the following questions in brief paragraph form 1 what is GAA.pdfshalini518936
 
Answer the following question in complete sentences. Minimum 1 page .pdf
Answer the following question in complete sentences. Minimum 1 page .pdfAnswer the following question in complete sentences. Minimum 1 page .pdf
Answer the following question in complete sentences. Minimum 1 page .pdfshalini518936
 
Answer the following 4 questions clearly1- What constitutes the i.pdf
Answer the following 4 questions clearly1- What constitutes the i.pdfAnswer the following 4 questions clearly1- What constitutes the i.pdf
Answer the following 4 questions clearly1- What constitutes the i.pdfshalini518936
 
Answer Question to receive full points Luke is an owner of four socc.pdf
Answer Question to receive full points Luke is an owner of four socc.pdfAnswer Question to receive full points Luke is an owner of four socc.pdf
Answer Question to receive full points Luke is an owner of four socc.pdfshalini518936
 
Answer just part (b) please 1. The Monetary Process a. Using the cas.pdf
Answer just part (b) please 1. The Monetary Process a. Using the cas.pdfAnswer just part (b) please 1. The Monetary Process a. Using the cas.pdf
Answer just part (b) please 1. The Monetary Process a. Using the cas.pdfshalini518936
 
Answer in your own words, no copy and paste for the following three .pdf
Answer in your own words, no copy and paste for the following three .pdfAnswer in your own words, no copy and paste for the following three .pdf
Answer in your own words, no copy and paste for the following three .pdfshalini518936
 
Another term used for solar panels isQuestion 3 optionsphotovol.pdf
Another term used for solar panels isQuestion 3 optionsphotovol.pdfAnother term used for solar panels isQuestion 3 optionsphotovol.pdf
Another term used for solar panels isQuestion 3 optionsphotovol.pdfshalini518936
 
Answer $570.Please explain how to get this answer and show the wo.pdf
Answer $570.Please explain how to get this answer and show the wo.pdfAnswer $570.Please explain how to get this answer and show the wo.pdf
Answer $570.Please explain how to get this answer and show the wo.pdfshalini518936
 
Answer All this question listed on this image file..Note do not c.pdf
Answer All this question listed on this image file..Note do not c.pdfAnswer All this question listed on this image file..Note do not c.pdf
Answer All this question listed on this image file..Note do not c.pdfshalini518936
 
ANOVA can be used only if the number of observations per group is eq.pdf
ANOVA can be used only if the number of observations per group is eq.pdfANOVA can be used only if the number of observations per group is eq.pdf
ANOVA can be used only if the number of observations per group is eq.pdfshalini518936
 
Annual Growth Rates of Real GDP Per Capita(in percents)Ending .pdf
Annual Growth Rates of Real GDP Per Capita(in percents)Ending .pdfAnnual Growth Rates of Real GDP Per Capita(in percents)Ending .pdf
Annual Growth Rates of Real GDP Per Capita(in percents)Ending .pdfshalini518936
 
Analyze the role of diversification in creating value for Google..pdf
Analyze the role of diversification in creating value for Google..pdfAnalyze the role of diversification in creating value for Google..pdf
Analyze the role of diversification in creating value for Google..pdfshalini518936
 
Angle A is an acute angle and sin(A) = 1114. What is the value of c.pdf
Angle A is an acute angle and sin(A) = 1114. What is the value of c.pdfAngle A is an acute angle and sin(A) = 1114. What is the value of c.pdf
Angle A is an acute angle and sin(A) = 1114. What is the value of c.pdfshalini518936
 
Anderson, Inc. has owned 70 of its subsidiary, Arthur Corp., for se.pdf
Anderson, Inc. has owned 70 of its subsidiary, Arthur Corp., for se.pdfAnderson, Inc. has owned 70 of its subsidiary, Arthur Corp., for se.pdf
Anderson, Inc. has owned 70 of its subsidiary, Arthur Corp., for se.pdfshalini518936
 
and need help calc the taxes as well as the taxable income An and Ca.pdf
and need help calc the taxes as well as the taxable income An and Ca.pdfand need help calc the taxes as well as the taxable income An and Ca.pdf
and need help calc the taxes as well as the taxable income An and Ca.pdfshalini518936
 
Ande is a multi-tasker. She listens to music, works on papers, and c.pdf
Ande is a multi-tasker. She listens to music, works on papers, and c.pdfAnde is a multi-tasker. She listens to music, works on papers, and c.pdf
Ande is a multi-tasker. She listens to music, works on papers, and c.pdfshalini518936
 
ANCIENT EGYPTIAN, Sometimes during the Ptolemic period, royal cartou.pdf
ANCIENT EGYPTIAN, Sometimes during the Ptolemic period, royal cartou.pdfANCIENT EGYPTIAN, Sometimes during the Ptolemic period, royal cartou.pdf
ANCIENT EGYPTIAN, Sometimes during the Ptolemic period, royal cartou.pdfshalini518936
 
Ancient art of Egiptian Tradition3. Figures were positioned differ.pdf
Ancient art of Egiptian Tradition3. Figures were positioned differ.pdfAncient art of Egiptian Tradition3. Figures were positioned differ.pdf
Ancient art of Egiptian Tradition3. Figures were positioned differ.pdfshalini518936
 
An urn contains three red and two white balls. A ball is drawn and t.pdf
An urn contains three red and two white balls. A ball is drawn and t.pdfAn urn contains three red and two white balls. A ball is drawn and t.pdf
An urn contains three red and two white balls. A ball is drawn and t.pdfshalini518936
 

More from shalini518936 (20)

Answer the followingHow would you find the normal approximation t.pdf
Answer the followingHow would you find the normal approximation t.pdfAnswer the followingHow would you find the normal approximation t.pdf
Answer the followingHow would you find the normal approximation t.pdf
 
answer the following questions in brief paragraph form 1 what is GAA.pdf
answer the following questions in brief paragraph form 1 what is GAA.pdfanswer the following questions in brief paragraph form 1 what is GAA.pdf
answer the following questions in brief paragraph form 1 what is GAA.pdf
 
Answer the following question in complete sentences. Minimum 1 page .pdf
Answer the following question in complete sentences. Minimum 1 page .pdfAnswer the following question in complete sentences. Minimum 1 page .pdf
Answer the following question in complete sentences. Minimum 1 page .pdf
 
Answer the following 4 questions clearly1- What constitutes the i.pdf
Answer the following 4 questions clearly1- What constitutes the i.pdfAnswer the following 4 questions clearly1- What constitutes the i.pdf
Answer the following 4 questions clearly1- What constitutes the i.pdf
 
Answer Question to receive full points Luke is an owner of four socc.pdf
Answer Question to receive full points Luke is an owner of four socc.pdfAnswer Question to receive full points Luke is an owner of four socc.pdf
Answer Question to receive full points Luke is an owner of four socc.pdf
 
Answer just part (b) please 1. The Monetary Process a. Using the cas.pdf
Answer just part (b) please 1. The Monetary Process a. Using the cas.pdfAnswer just part (b) please 1. The Monetary Process a. Using the cas.pdf
Answer just part (b) please 1. The Monetary Process a. Using the cas.pdf
 
Answer in your own words, no copy and paste for the following three .pdf
Answer in your own words, no copy and paste for the following three .pdfAnswer in your own words, no copy and paste for the following three .pdf
Answer in your own words, no copy and paste for the following three .pdf
 
Another term used for solar panels isQuestion 3 optionsphotovol.pdf
Another term used for solar panels isQuestion 3 optionsphotovol.pdfAnother term used for solar panels isQuestion 3 optionsphotovol.pdf
Another term used for solar panels isQuestion 3 optionsphotovol.pdf
 
Answer $570.Please explain how to get this answer and show the wo.pdf
Answer $570.Please explain how to get this answer and show the wo.pdfAnswer $570.Please explain how to get this answer and show the wo.pdf
Answer $570.Please explain how to get this answer and show the wo.pdf
 
Answer All this question listed on this image file..Note do not c.pdf
Answer All this question listed on this image file..Note do not c.pdfAnswer All this question listed on this image file..Note do not c.pdf
Answer All this question listed on this image file..Note do not c.pdf
 
ANOVA can be used only if the number of observations per group is eq.pdf
ANOVA can be used only if the number of observations per group is eq.pdfANOVA can be used only if the number of observations per group is eq.pdf
ANOVA can be used only if the number of observations per group is eq.pdf
 
Annual Growth Rates of Real GDP Per Capita(in percents)Ending .pdf
Annual Growth Rates of Real GDP Per Capita(in percents)Ending .pdfAnnual Growth Rates of Real GDP Per Capita(in percents)Ending .pdf
Annual Growth Rates of Real GDP Per Capita(in percents)Ending .pdf
 
Analyze the role of diversification in creating value for Google..pdf
Analyze the role of diversification in creating value for Google..pdfAnalyze the role of diversification in creating value for Google..pdf
Analyze the role of diversification in creating value for Google..pdf
 
Angle A is an acute angle and sin(A) = 1114. What is the value of c.pdf
Angle A is an acute angle and sin(A) = 1114. What is the value of c.pdfAngle A is an acute angle and sin(A) = 1114. What is the value of c.pdf
Angle A is an acute angle and sin(A) = 1114. What is the value of c.pdf
 
Anderson, Inc. has owned 70 of its subsidiary, Arthur Corp., for se.pdf
Anderson, Inc. has owned 70 of its subsidiary, Arthur Corp., for se.pdfAnderson, Inc. has owned 70 of its subsidiary, Arthur Corp., for se.pdf
Anderson, Inc. has owned 70 of its subsidiary, Arthur Corp., for se.pdf
 
and need help calc the taxes as well as the taxable income An and Ca.pdf
and need help calc the taxes as well as the taxable income An and Ca.pdfand need help calc the taxes as well as the taxable income An and Ca.pdf
and need help calc the taxes as well as the taxable income An and Ca.pdf
 
Ande is a multi-tasker. She listens to music, works on papers, and c.pdf
Ande is a multi-tasker. She listens to music, works on papers, and c.pdfAnde is a multi-tasker. She listens to music, works on papers, and c.pdf
Ande is a multi-tasker. She listens to music, works on papers, and c.pdf
 
ANCIENT EGYPTIAN, Sometimes during the Ptolemic period, royal cartou.pdf
ANCIENT EGYPTIAN, Sometimes during the Ptolemic period, royal cartou.pdfANCIENT EGYPTIAN, Sometimes during the Ptolemic period, royal cartou.pdf
ANCIENT EGYPTIAN, Sometimes during the Ptolemic period, royal cartou.pdf
 
Ancient art of Egiptian Tradition3. Figures were positioned differ.pdf
Ancient art of Egiptian Tradition3. Figures were positioned differ.pdfAncient art of Egiptian Tradition3. Figures were positioned differ.pdf
Ancient art of Egiptian Tradition3. Figures were positioned differ.pdf
 
An urn contains three red and two white balls. A ball is drawn and t.pdf
An urn contains three red and two white balls. A ball is drawn and t.pdfAn urn contains three red and two white balls. A ball is drawn and t.pdf
An urn contains three red and two white balls. A ball is drawn and t.pdf
 

Recently uploaded

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Recently uploaded (20)

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

Answer each of the questions below with a few sentences. Be brief, b.pdf

  • 1. Answer each of the questions below with a few sentences. Be brief, but fully explain your answer. 1. Explain what is an IPSweep and a PortSweep type of attack? 2. In a few words, explain what are buffer overflow attacks? 3. Describe and explain Denial of Service (DoS) and Distributed Denial of Service (DDoS) network attacks. 4. Briefly describe what are routing attacks. Provide two examples, highlighting their main characteristics. 5. What countermeasures would you recommend to defend against these types of attacks? Solution 1. IPsweep: The function ipswep attack is used to determine how many devices are connected to the network and check what services these devices are running. portsweep: The portsweep supports many ports to know which services provided to a single host. The port is not opened until it supports three way hand shake. 2. it is discovered in hacking circles. This is not risky application even the iput strength is not good. it must access by the administrator and the output comes from the way the input is implemented. 3. Denial of services attack : it is a one of the cyber attack. In this the hackers doesn't enter into your website it just unavailable your site to the user and make your website as a malcious website. There by it take down the security firewall. Distributed Denial of services attack: It mainly focuses on the multiple devices it is same as the Denial of service attack. 4. Routing attack is one of the main problem in security breach because the router sends the data in the form of packets so attackers mistreat those packets means they change the data or information and sends. and the hackers sends the malcious packets to the router there by the router gets affected and they can easily breachg into the router. Ex: Consider an organizatiopn using a router the data that is sent by router in the form of packets and these packets data when ever hacked by the hackers due to less security they change the packet data and sends back there by wrong information is registered so the adminstrator has to provide some security and authentication to the router. 5. To work against the hackers we must take active measures to defend against these attacks, The information that is sent by the attackers or hackers must not be opened in our systems so that we have to take care of not opening those keep secured with highly authentication and the password
  • 2. should not be in common way it has to be difficult so they cannot expect to be so. Avoid over writing the addresses.Be activity at time when suddenly if any thing wrong happens we must be in a position to handle and manage the problem because it causes more damage when time runs.