Professional Documents
Culture Documents
Assignment 1
Assignment 1
1. Suppose that you have online store that allows consumers to order products
from the web.
Phishing
DoS & DDoS Attacks
Password breaches
Malware
SQL Injection : It is a malicious technique where a hacker attacks your query
submission forms to be able to access your backend database.
Cross-Site Scripting XSS: The attackers can plant a malicious JavaScript
snippet on your e-commerce store to target your online visitors and customers
Passwords
9. Man in The Middle (MITM)
A hacker may listen in on the communication taking place between your e-
commerce store and a user. Walgreens Pharmacy Store experienced such an
incident. If the user is connected to a vulnerable Wi-Fi or network, such
attackers can take advantage of that.
2. Name one case where using stream cipher is efficient than block cipher
• Stream Cipher encrypt the message bit by bit until byte by byte. Block cipher
encrypt the message in fixed number of bit as single block.
•
Stream Block
Advantages Speed of
transformation. diffusion
Low error
propagation. to insertion
symbol.
Disadvantages Low
diffusion. encryption
Susceptibilit
y to malicious
b. Find the hash code for this file using MD5 algorithm.
c. Take clear screen shot of your screen, paste it here in this file and upload to
LMS
certutil -hashfile "filename.exe" MD5