SlideShare a Scribd company logo
Answer the following questions. Each question response should
be at least 1 page, and answer each question fully.
Question 1:
Topic: Common Software Vulnerabilities
Most cyber-attacks happen because vulnerabilities in system or
application software. Buffer Overflow, SQL Injection, Code/OS
Command Injection, Cross-Site Scripting (XSS), Cross-Site
Request Forgery and Race Conditions are very common
vulnerabilities. (Refer to both NIST/DHS and MITRE databases
of common vulnerabilities (http://nvd.nist.gov/cwe.cfm;
http://cwe.mitre.org/top25/).) For this conference, explain what
a specific vulnerability is, describe a famous attack that
leveraged it (For example, the Morris worm leveraged the buffer
overflow vulnerability), and how it can be prevented/minimized.
Question 2:
Topic: Database Security
In this session, you learnt a lot about database security. We will
focus three topics for this conference: (1) Inference in ordinary
databases or statistical databases, (2) database privacy (through
encryption), and (3) cloud security. Please pick one of these
three topics and explain in your own words what the problem or
issue is, how the issue is being addressed and some of the
concerns with the solutions being proposed.
Question 3:
Topic: Attacks on Networks
In this conference, we will focus on typical attacks in the
Internet affecting confidentiality, integrity and availability at
various layers: Layer 1: Physical; Layer 2: Link; Layer 3:
Network; Layer 4: Transport, and Layer 5: Application. (This is
IP Layering; in IP layering, roughly Session, Presentation and
Application of the OSI layers are combined into a single
Application layer). Pick one layer and describe typical attacks
in that layer and the controls that are employed in the layer to
minimize the attack or vulnerability that leads to the attack. For
example, in the link and network layers, there can be packet
sniffing attacks, in the IP (network layer), there could be
spoofing attacks, and in various layers, there could be denial of
service attacks. Be as specific and as complete as possible and
cite your reference materials in your response.

More Related Content

DOCX
Pick one layer and describe typical attacks in that layer and the co.docx
PDF
Analysis on Common Network Attacks & Vulnerability Scanners
PPTX
PPT Lecture 1.1 and 1.2(Database concepts and database system architecture).pptx
PPTX
Unit-2 Network Security Concepts (1).pptx
PDF
Vulnerability threat and attack
DOCX
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
ODP
Barcamp: Open Source and Security
DOCX
Write the questions followed by your answers.1.Using the web.docx
Pick one layer and describe typical attacks in that layer and the co.docx
Analysis on Common Network Attacks & Vulnerability Scanners
PPT Lecture 1.1 and 1.2(Database concepts and database system architecture).pptx
Unit-2 Network Security Concepts (1).pptx
Vulnerability threat and attack
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
Barcamp: Open Source and Security
Write the questions followed by your answers.1.Using the web.docx

Similar to Answer the following questions. Each question response should be at .docx (20)

PPT
SYSTEM SECURITY - Chapter 1 introduction
DOCX
Suppose that you are currently employed as an Information Security M.docx
DOCX
Laureate Online Education Information Security Engineering .docx
PDF
Formative Task 3: Social Engineering Attacks
PPTX
Chapter 12 - Securing a Network CompTIA Network+
DOCX
cybersecurity essay.docx
PDF
Software Security Engineering (Learnings from the past to fix the future) - B...
DOCX
write a review about wired Network Security -Network vulnerabilities -.docx
PPT
Trends in network security feinstein - informatica64
PDF
WIRELESS COMPUTING AND IT ECOSYSTEMS
PPTX
Cyber terrorism
DOCX
Assignment 2 CybersecurityWe use computers and electronic systems.docx
DOCX
Running head Cryptography1Cryptography16.docx
DOC
SEC 572 Inspiring Innovation / tutorialrank.com
PDF
Performance evaluation of network security protocols on open source and micro...
PDF
Performance evaluation of network security protocols on open source and micro...
PDF
1) Name the seven layers of the OSI network model, and 2) enumerate .pdf
PPT
1.Architecture
PPT
3.Secure Design Principles And Process
PPTX
Lesson2.9 o u2l6 who cares about encryption
SYSTEM SECURITY - Chapter 1 introduction
Suppose that you are currently employed as an Information Security M.docx
Laureate Online Education Information Security Engineering .docx
Formative Task 3: Social Engineering Attacks
Chapter 12 - Securing a Network CompTIA Network+
cybersecurity essay.docx
Software Security Engineering (Learnings from the past to fix the future) - B...
write a review about wired Network Security -Network vulnerabilities -.docx
Trends in network security feinstein - informatica64
WIRELESS COMPUTING AND IT ECOSYSTEMS
Cyber terrorism
Assignment 2 CybersecurityWe use computers and electronic systems.docx
Running head Cryptography1Cryptography16.docx
SEC 572 Inspiring Innovation / tutorialrank.com
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
1) Name the seven layers of the OSI network model, and 2) enumerate .pdf
1.Architecture
3.Secure Design Principles And Process
Lesson2.9 o u2l6 who cares about encryption
Ad

More from spoonerneddy (20)

DOCX
Choose a National Transportation Safety Board (NTSB) report of a w.docx
DOCX
Choose a global health issue. For this assignment, you will introduc.docx
DOCX
Choose a geographic community of interest (Hyde park, Illinois) and .docx
DOCX
Choose a disease condition of the gastrointestinal tract, describe.docx
DOCX
Choose a few health issues in your community that can be used to pla.docx
DOCX
Choose a current member of Congress and research their background. P.docx
DOCX
Choose a couple of ways how your life would be different without the.docx
DOCX
Choose a countrydifferent fromyournative country,and.docx
DOCX
Choose 5 questions and answer them with my materials onlyD.docx
DOCX
Choose a communication situation you recently experienced at you.docx
DOCX
Choose 5 interconnected leadership task (listed below). Tell why eac.docx
DOCX
Choose 5 out of the first 10 questions, 5 pages essay1. Where do.docx
DOCX
Choose 3 or 4 poems from Elizabeth Bishop. You may choose any poems .docx
DOCX
Choose 1 topic to write an essay. Dont restate all the time. Write .docx
DOCX
Choose 1 focal point from each subcategory of practice, educatio.docx
DOCX
Choose 1 focal point from each subcategory of practice, education, r.docx
DOCX
Chinese HistoryBased on the lecture on Chinese History and Marxi.docx
DOCX
Children need an Aesthetics Experience from the teacher and in the c.docx
DOCX
China’s economy中国经济httpworldmap.harvard.educhinamap.docx
DOCX
Childrens Health Insurance Program CHIP. Respond to the 5 questions.docx
Choose a National Transportation Safety Board (NTSB) report of a w.docx
Choose a global health issue. For this assignment, you will introduc.docx
Choose a geographic community of interest (Hyde park, Illinois) and .docx
Choose a disease condition of the gastrointestinal tract, describe.docx
Choose a few health issues in your community that can be used to pla.docx
Choose a current member of Congress and research their background. P.docx
Choose a couple of ways how your life would be different without the.docx
Choose a countrydifferent fromyournative country,and.docx
Choose 5 questions and answer them with my materials onlyD.docx
Choose a communication situation you recently experienced at you.docx
Choose 5 interconnected leadership task (listed below). Tell why eac.docx
Choose 5 out of the first 10 questions, 5 pages essay1. Where do.docx
Choose 3 or 4 poems from Elizabeth Bishop. You may choose any poems .docx
Choose 1 topic to write an essay. Dont restate all the time. Write .docx
Choose 1 focal point from each subcategory of practice, educatio.docx
Choose 1 focal point from each subcategory of practice, education, r.docx
Chinese HistoryBased on the lecture on Chinese History and Marxi.docx
Children need an Aesthetics Experience from the teacher and in the c.docx
China’s economy中国经济httpworldmap.harvard.educhinamap.docx
Childrens Health Insurance Program CHIP. Respond to the 5 questions.docx
Ad

Recently uploaded (20)

PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Trump Administration's workforce development strategy
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
1_English_Language_Set_2.pdf probationary
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
Empowerment Technology for Senior High School Guide
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Paper A Mock Exam 9_ Attempt review.pdf.
Trump Administration's workforce development strategy
B.Sc. DS Unit 2 Software Engineering.pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
1_English_Language_Set_2.pdf probationary
Hazard Identification & Risk Assessment .pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Virtual and Augmented Reality in Current Scenario
Empowerment Technology for Senior High School Guide
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Introduction to pro and eukaryotes and differences.pptx
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Computing-Curriculum for Schools in Ghana
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
HVAC Specification 2024 according to central public works department
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape

Answer the following questions. Each question response should be at .docx

  • 1. Answer the following questions. Each question response should be at least 1 page, and answer each question fully. Question 1: Topic: Common Software Vulnerabilities Most cyber-attacks happen because vulnerabilities in system or application software. Buffer Overflow, SQL Injection, Code/OS Command Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery and Race Conditions are very common vulnerabilities. (Refer to both NIST/DHS and MITRE databases of common vulnerabilities (http://nvd.nist.gov/cwe.cfm; http://cwe.mitre.org/top25/).) For this conference, explain what a specific vulnerability is, describe a famous attack that leveraged it (For example, the Morris worm leveraged the buffer overflow vulnerability), and how it can be prevented/minimized. Question 2: Topic: Database Security In this session, you learnt a lot about database security. We will focus three topics for this conference: (1) Inference in ordinary databases or statistical databases, (2) database privacy (through encryption), and (3) cloud security. Please pick one of these three topics and explain in your own words what the problem or issue is, how the issue is being addressed and some of the concerns with the solutions being proposed. Question 3: Topic: Attacks on Networks In this conference, we will focus on typical attacks in the Internet affecting confidentiality, integrity and availability at various layers: Layer 1: Physical; Layer 2: Link; Layer 3: Network; Layer 4: Transport, and Layer 5: Application. (This is IP Layering; in IP layering, roughly Session, Presentation and Application of the OSI layers are combined into a single
  • 2. Application layer). Pick one layer and describe typical attacks in that layer and the controls that are employed in the layer to minimize the attack or vulnerability that leads to the attack. For example, in the link and network layers, there can be packet sniffing attacks, in the IP (network layer), there could be spoofing attacks, and in various layers, there could be denial of service attacks. Be as specific and as complete as possible and cite your reference materials in your response.