Cos001330 Unit 3 Lab Test

1056 Words3 Pages

COS0013-LAB TEST 1 1. What is a “honeypot”? It is a trap set in computer system is used to detect unauthorized access and to collect information regarding intruder or attacker in the system. Honeypot is considered as one of the security technique used in the computer to trap the attacker. 2. What is “blackholling”? Blackholling is used to stop the denial of attacks and malware based attacks. It is a technique used by the internet service providers to block the data coming from certain ip addresses. This is technique can be also used in personal networks. 3. What is “air-gap security”? It is a network security measure used in computer networks to ensure that the secure network physically protected from other unprotected networks. This …show more content…

In 1989 Clifford Stoll wrote a book called “The Cuckoo’s Egg”. Explain the relevance of the book’s title? In the book context it is a malware program that an attacker uses to replace a legal program. It is like a cuckoo bird laying it's eggs in another bird's nest. The cook bird does not lay eggs in its nest. 17. Define dictionary attacks and brute force attacks .How ere they similar and different? A dictionary attack is a technique used to break the computer security of a password-protected machine or server by systematically entering each word in dictionary as a password. A brute force attack is a trial-and-error method used to obtain secret information such passwords. In brute force attack it tries all possible key combination to find the password. But dictionary attack uses only the known word. In brute force attack it is easy to crack when the key length is small. If the password is common then it is to crack by using dictionary attack. 18. Explain the difference between penetration test and a security audit? The goal of penetration test is to find the security flaws in the system by intentionally attacking the system. It is goes deeper by stealing the data to find the vulnerabilities. Security audit is the evaluation of security of a company with certain baseline. The goal of security audit is to ensure all security techniques are working well in the

Open Document