You are on page 1of 4

NAME: DANIEL PETER

REG#: R1711755

PROGRAM: HCF

COURSE CODE HCF 203

ASSIGNMENT 3
1. BaseException class
2. Built-in Modules
3. cURL
4. socket.accept ()
5. socket.send(data,address)
6. bind(IP,PORT)
7. the sequence of function calls for a client and server participating in a UDP connection

 The server and client both create a socket s.


 The server uses the bind call to associate a local address to the socket.The client can issue
an optional bind call to a local address.
 The sendto and recvfrom calls between the client and server continue until all the data has been
transferred.
 Both the server and client end the session using the close call

PART B
8.

Parameters CYBER SECURITY INFORMATION SECURITY


Basic It is the practice of It is all about protecting information from
Definition protecting the data from unauthorized users, access, and data
outside the resource on the modification or removal in order to provide
internet. confidentiality, integrity, and availability.
Protect It is about the ability to It deals with the protection of data from any
protect the use of form of threat.
cyberspace from cyber-
attacks.
Scope Cybersecurity to protect Information security is for information
anything in the cyber irrespective of the realm.
realm.
Threat Cybersecurity deals with Information security deals with the protection of
the danger in cyberspace. data from any form of threat.
Attacks Cybersecurity strikes Information security strikes against
against Cybercrimes, cyber unauthorized access, disclosure modification,
frauds, and law and disruption.
enforcement.

9. Port scanning refers to the act of searching for a computer's ports through the use of specialized software.
This software searches for the ''doorways'' in a computer and classifies them into one of three categories—
open, closed, or filtered. Once the port scan is complete, the user will then be able to see all of the available
ports on the target machine as well as their classification. This can be useful for security administrators who
want to see if any open ports need to be closed or filtered. However, a hacker can also use this information
to plan an attack that corresponds to a specific port's classification.
10. Nmap is used primarily for port scanning. It is therefore important to differentiate between different types
of port states available in Nmap. There are six possible port states recognized by Nmap:

Open – indicates that an application is listening for connections on the port. The primary goal of port
scanning is to find these.

Closed – indicates that the probes were received but but there is no application listening on the port.

Filtered – indicates that the probes were not received and the state could not be established.

Unfiltered – indicates that the probes were received but a state could not be established. In other words, a
port is accessible, but Nmap is unable to determine whether it is open or closed.

Open/filtered– indicates that the port was filtered or open but Nmap couldn’t establish the state.

Closed/filtered – indicates that Nmap is unable to determine whether a port is closed or filtered.

11. List down and briefly explain five factors that can cause or introduce vulnerabilities within systems?

 Reasons of hardware imperfection


If the hardware is a bit older it is prone to vulnerability
 Reasons of software imperfection
If the software is complex the system it is prone to vulnerability
 Human factor
Human error will lead to system vulnerability
 Process imperfections
If the processes of the system are not in order or organized it will lead to the vulnerability of the
system
 Availability
If the system is always down it lead to the it vulnerability
12 Open Web Application Security Project (OWASP) is an online community that produces freely-available
articles, methodologies, documentation, tools.

CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security
flaws. When someone refers to a CVE, they mean a security flaw that's been assigned a CVE ID number.

Common Weakness Enumeration (CWE) list identifies software security weaknesses in software and
hardware

You might also like