You are on page 1of 3

Al Imam Mohammad Ibn Saud Islamic University

College of Computer and Information Sciences


Information Systems Department

Course Title: Cybersecurity


Course Code: IS 380
Title: Assignment
Semester: Fall 2022
Due Date: Thursday 22 Feb 2022 ( 12:00 am- noon)

‫نجالء عبدالرحمن عبد الكريم الحسون‬.‫أ‬


‫ بريطانيا‬,‫ جامعة شيفيلد‬،‫ ماجستير نظم المعلومات‬- ‫محاضرة‬
‫ التفاعل بين الحاسب والبيئة‬, ‫ ادارة البيانات‬:‫االهتمامات البحثية‬
01125 :‫ هاتف المكتب‬، 4103 :‫رقم المكتب‬xxxxx
‫البريد االلكتروني‬: Najlais@ccis.imamu.edu.sa

Student Name (in Arabic) Student ID Section

Official Use Only


Question Student Marks Question Marks
1 6
2 2
3 2
Total Out of 10
Answer the following questions:

1. Suppose that you have online store that allows consumers to order products
from the web.

a. Who might want to attack the program?


 Store competitors who don't want me to succeed
 Online thieves because the store contains sensitive financial data
b. What types of harm might they want to cause?
 Steal sensitive data like credit card information
 Flood the server with requests so legitimate users can’t reach the
website.
 Spreading a bad reputation on the store so that customers do not trust
it
c. 5. Data Breaches
d. A data breach occurs when hackers gain unauthorized access to data in
web applications. When you enter your personal information into
websites as you shop online, you stand a risk of having your information
exposed in the event of a data breach.
e. What kinds of vulnerabilities might they exploit to cause harm?

Phishing
DoS & DDoS Attacks
Password breaches
Malware
SQL Injection : It is a malicious technique where a hacker attacks your query
submission forms to be able to access your backend database.
Cross-Site Scripting XSS: The attackers can plant a malicious JavaScript
snippet on your e-commerce store to target your online visitors and customers
Passwords
9. Man in The Middle (MITM)
A hacker may listen in on the communication taking place between your e-
commerce store and a user. Walgreens Pharmacy Store experienced such an
incident. If the user is connected to a vulnerable Wi-Fi or network, such
attackers can take advantage of that.

2. Name one case where using stream cipher is efficient than block cipher

• Stream Cipher encrypt the message bit by bit until byte by byte. Block cipher
encrypt the message in fixed number of bit as single block.

Stream Block
Advantages  Speed of 
transformation. diffusion
 Low error 
propagation. to insertion
symbol.
Disadvantages  Low 
diffusion. encryption
 Susceptibilit 
y to malicious 

3. Perform the following tasks :

a. Download the “HashAssigment.pdf” file from Assignment folder in our


course page on LMS.

b. Find the hash code for this file using MD5 algorithm.
c. Take clear screen shot of your screen, paste it here in this file and upload to
LMS
certutil -hashfile "filename.exe" MD5

You might also like