We are here with you hands in hands to facilitate your learning & don't appreciate the idea of copying or replicating solutions. Read More>>
+ Link For Assignments, GDBs & Online Quizzes Solution
+ Link For Past Papers, Solved MCQs, Short Notes & More
Dear Students! Share your Assignments / GDBs / Quizzes files as you receive in your LMS, So it can be discussed/solved timely. Add Discussion
How to Add New Discussion in Study Group ? Step By Step Guide Click Here.
Let us assume that you are hired as a Network analyzer in an IT solution provider company. Your job responsibility is to monitor the data traffic within and from out of company. Your company has threat of stealing data and other data attacks.
Identify the following attack types and also give the solution for each.
1- Identify the attacking technique and its solution in which Say that the hacker gain access to the restricted communication channel by using session that another user has already established
2- Identify the attacking technique and its solution in which an attacker outside your network pretends to be a trusted user either by using an IP address that is within the range of IP addresses for your network or by using an authorized external IP address that you trust and to which you want to provide access to specified resources on your network
3- Identify the attack in which the attacker uses a fake identity, such as a network identity, to gain unauthorized access to personal computer information through legitimate access identification
.+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)
+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)+ Click Here to Search (Looking For something at vustudents.ning.com?) + Click Here To Join (Our facebook study Group)
kitnay marks ki hai yeh assignment ahmed ???
bro 20 marks ke
Please Discuss here about this assignment.Thanks
Our main purpose here discussion not just Solution
We are here with you hands in hands to facilitate your learning and do not appreciate the idea of copying or replicating solutions. Read More>>
For Important Helping Material related to this subject (Solved MCQs, Short Notes, Solved past Papers, E-Books, FAQ,Short Questions Answers & more). You must view all the featured Discussion in this subject group.
For how you can view all the Featured discussions click on the Back to Subject Name Discussions link below the title of this Discussion & then under featured Discussion corner click on the view all link.
Or visit this link
Please Click on the below link to see…
These techniques are in which chapter of hand books , i did not find them.
if some one know ,please reply.
I think these techniques could be found in lesson no-39 Web Security.
anybody tried to solve this solution??
no responce about this solution guys
i think these are related to active attacks. ???
lesson no-39 Web Security. ... Yeah its related to this lecture ... Listen Lecture Video ... will helpful for solution .... otherwise I will share solution tomorrow ....
Answer for Peoblem 1:
It is Piggybacking attack in this type of attack hacker gaining access to a restricted communications channel by using the session another user already established. Piggy-backing can be defeated by logging out before walking away from a workstation or terminal or by initiating a screensaver that requires re-authentication when resuming. There are numbers of ways to prevent piggybacking, especially physically. There are a plethora of physical access technologies that are cropping up, as a means to keep intruders (piggybackers and social engineers) out. Key card and key pad access control systems are already widely used, but once access is granted, anyone could pass through the door
39.4 Types of Active attacks
Common form of active attacks may include the following:
• Masquerading – involves carrying out unauthorized activity by impersonating a legitimateuser of the system.
• Piggybacking – involves intercepting communications between the operating system and
the user and modifying them or substituting new messages.
• Spoofing – A penetrator fools users into thinking they are interacting with the operating
system. He duplicates logon procedure and captures pass word.
• Backdoors/trapdoors – it allows user to employ the facilities of the operating systemwithout being subject to the normal controls.
its from chapter 39 and just get the each type of attack detail from net.