This document asks about different types of computer network types, the differences between OSI and TCP/OP layers, explanations of layer-wise attacks including SQL injection and cross-site scripting, intrusion prevention systems, IDs, and the Indian Cyber Act of 2000. It also asks about explaining the NIST Cybersecurity Framework and OWASP Top 10 vulnerabilities.
This document asks about different types of computer network types, the differences between OSI and TCP/OP layers, explanations of layer-wise attacks including SQL injection and cross-site scripting, intrusion prevention systems, IDs, and the Indian Cyber Act of 2000. It also asks about explaining the NIST Cybersecurity Framework and OWASP Top 10 vulnerabilities.
This document asks about different types of computer network types, the differences between OSI and TCP/OP layers, explanations of layer-wise attacks including SQL injection and cross-site scripting, intrusion prevention systems, IDs, and the Indian Cyber Act of 2000. It also asks about explaining the NIST Cybersecurity Framework and OWASP Top 10 vulnerabilities.