CS205 Assignment 2 Solution and Discussion


  • Cyberian's Gold

    Assignment No. 02
    Semester: Fall 2019
    CS205: Information Security Total Marks: 15

    Due Date: 28/11/2019

    Instructions:
    Please read the following instructions carefully before submitting assignment:
    You need to use MS word document to prepare and submit the assignment on VU-LMS.
    It should be clear that your assignment will not get any credit if:

     The assignment is submitted after due date.
     The assignment is not in the required format (doc or docx)
     The submitted assignment does not open or file is corrupt.
     Assignment is copied (partial or full) from any source (websites, forums, students, etc)

    Objectives:

    To enhance the learning capabilities of the students about:

    1. Software Attacks
    2. Need for Security against attacks

    Assignment
    Question No-1:

    “Friend Circle” is a social media platform yet to be launched. Currently, it is in testing phase in which various security policies in the perspective of an online platform are being tested. Following are the reports / observations of such tests:
    Report 1:
    Upon testing the login interface, the security experts found a loophole in the system that an unauthorized person can login to the system by trying different combinations of passwords.
    Report 2:
    It is observed that bundle of unnecessary requests possibly generated by some computers or bots can overload the application and resultantly system may crash or fail to perform ordinary functions.

    After carefully analyzing above mentioned reports, you are required to identify the type of attack associated with each report. Also mention one suitable solution to tackle the identified attack.
    Question No-2:

    Carefully study the Topics “threat” and “software attacks” and identify the deliberate software attacks for following situations with proper justification.

    1. Suppose a user receives an email containing an image file as the attachment. As the user opens the file, different files on his systems get deleted or modified.
    2. A student copied some files from his USB flash drive to a computer in university lab. After doing this, he observed that the number of files on the system got duplicated and overall performance of the system got deteriorated. He faced too much delay in performing tasks by the computer.
    3. A user noticed that someone is using his Facebook account after stealing his credentials. After investigation, he observed that it happened after installing a software downloaded from an un-authentic website.

  • Cyberian's Gold

    @zareen said in CS205 Assignment 2 Solution and Discussion:

    A user noticed that someone is using his Facebook account after stealing his credentials. After investigation, he observed that it happened after installing a software downloaded from an un-authentic website.

    Aug 25, 2019 - Hacked Facebook accounts are being sold on the dark web, showing the … Problem is that since so many web sites make you use your email for log in name, I’m not … 90 EACH days after the ‘worst ever’ hack of 50 million users (and here’s … a hacker has claimed he sold the plaintext passwords and email …
    link text


  • Cyberian's Gold

    @zareen said in CS205 Assignment 2 Solution and Discussion:

    A student copied some files from his USB flash drive to a computer in university lab. After doing this, he observed that the number of files on the system got duplicated and overall performance of the system got deteriorated. He faced too much delay in performing tasks by the computer.

    gathering their data, if this is the case then theoretically all you need to do is flip to the … button to the right of this to tell SPSS where to put the file if you want to store it … Keep one on a floppy disk or USB stick etc. and the other on your student … want to save it and probably copy some into MS Word (see the note on …
    link text


  • Cyberian's Gold

    @zareen said in CS205 Assignment 2 Solution and Discussion:

    Suppose a user receives an email containing an image file as the attachment. As the user opens the file, different files on his systems get deleted or modified.

    These are files of any kind that accompany an email message. … Instead, that file contains instructions on where to locate the image file, and then … Other kinds of HTML emails don’t use an internet location for an image; instead, the … and if the image it contains is fetched from their server, they know you opened their email.
    link text


  • Cyberian's Gold

    @zareen said in CS205 Assignment 2 Solution and Discussion:

    It is observed that bundle of unnecessary requests possibly generated by some computers or bots can overload the application and resultantly system may crash or fail to perform ordinary functions.

    the “Peer to Peer” collect request which can be scheduled and paid as per … sensitive information on computers opens business up to cyber-attacks, with … way of selling its Security Products”), possibly 2012 LinkedIn breach lead to the … flooded the company’s site with internet traffic in an effort to overload digital systems.
    link text



    Recent Topics


|