You are on page 1of 1

15. Does the intellectual property owned by an organization usually have value?

If so, how can


attackers threaten that value?

Yes, intellectual property owned by an organization usually has value. Attackers can threaten the value
of intellectual property by engaging in piracy or copyright infringement, where they illegally copy or use
the organization's intellectual property without permission. This can result in financial losses for the
organization and can also damage its reputation.

16. What are the types of password attacks? What can a systems administrator do to protect against
them?

The types of password attacks include brute force attacks, where the attacker tries all possible
combinations of characters to guess the password, and dictionary attacks, where the attacker uses a
pre-generated list of commonly used passwords to guess the password. A systems administrator can
protect against these attacks by implementing strong password policies, such as requiring complex
passwords with a combination of letters, numbers, and special characters, and by implementing
account lockout policies that lock an account after a certain number of failed login attempts.

17. What is the difference between a denial-of-service attack and a distributed denial-of-service
attack? Which is more dangerous? Why?

A denial-of-service (DoS) attack is when an attacker overwhelms a target system with a flood of traffic
or requests, causing it to become unavailable to legitimate users. A distributed denial-of-service (DDoS)
attack is similar, but it involves multiple compromised computers, known as a botnet, to launch the
attack. DDoS attacks are generally more dangerous because they have a larger scale and are harder to
mitigate due to the distributed nature of the attack.

18. For a sniffer attack to succeed, what must the attacker do? How can an attacker gain access to a
network to use the sniffer system?

For a sniffer attack to succeed, the attacker must gain unauthorized access to the network and install a
sniffer system that can capture and analyze network traffic. An attacker can gain access to a network by
exploiting vulnerabilities in the network infrastructure, such as weak passwords, unpatched software,
or misconfigured security settings. They can also gain access through social engineering techniques,
such as tricking a user into revealing their login credentials.

19. What methods does a social engineering hacker use to gain information about a user’s login id
and password? How would this method differ if it were targeted towards an administrator���s
assistant versus a data-entry clerk?

A social engineering hacker may use methods such as phishing emails, where they send fake emails
that appear to be from a legitimate source and trick the user into revealing their login credentials. They
may also use pretexting, where they create a false scenario or identity to deceive the user into
providing their login information.

If targeted towards an administrator's assistant, the hacker may use more sophisticated techniques,
such as impersonating a higher-level executive or using insider knowledge to gain the assistant's trust. If
targeted towards a data-entry clerk, the hacker may use simpler methods, such as sending a phishing
email that appears to be from a colleague or supervisor.

20. What is a buffer overflow, and how is it used against a Web server?

A buffer overflow is a software vulnerability where an attacker sends more data to a buffer than it can
handle, causing the excess data to overflow into adjacent memory locations. This can lead to the
execution of malicious code or the crashing of the system. Against a Web server, an attacker can exploit
a buffer overflow vulnerability by sending specially crafted input, such as a long string of characters, to
a vulnerable component of the server. This can allow the attacker to gain unauthorized access to the
server or execute arbitrary code.

You might also like