Question

In: Computer Science

Problem 1: Define the following terms: Phishing Denial of service attack Distributed denial of service attack...

Problem 1: Define the following terms:

Phishing
Denial of service attack
Distributed denial of service attack
Cookie
Blockchain

Solutions

Expert Solution

Answer:---------

Phishing:----- Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

Denial of service attack:------ A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.

Distributed denial of service attack:----- A distributed denial-of-service (DDoS) attack is one of the most powerful weapons on the internet. When you hear about a website being “brought down by hackers,” it generally means it has become a victim of a DDoS attack. In short, this means that hackers have attempted to make a website or computer unavailable by flooding or crashing the website with too much traffic.

Cookie:----- A cookie is a message given to a web browser by a web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server.

Blockchain:----- A blockchain is, in the simplest of terms, a time-stamped series of immutable record of data that is managed by cluster of computers not owned by any single entity. Each of these blocks of data (i.e. block) are secured and bound to each other using cryptographic principles.


Related Solutions

What is a Denial of Service attack? Describe two common Denial of Service (DoS) attacks on...
What is a Denial of Service attack? Describe two common Denial of Service (DoS) attacks on servers?
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted...
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices. From a high level, a DDoS attack is like a traffic jam clogging up with highway, preventing regular...
Which of the following is a denial of service attack? Group of answer choices When a...
Which of the following is a denial of service attack? Group of answer choices When a cracker enters a system through an idle modem, captures the PC attached to the modem, and then gains access to the network to which it is connected. Both a perpetrator who sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider's e-mail server AND a perpetrator who e-mails the same message to everyone on one or more LISTSERV lists are...
You work at a company that is currently under a Distributed Denial of Services attack, performed...
You work at a company that is currently under a Distributed Denial of Services attack, performed by a very large botnet. You discover the vulnerability that would allow all of the bots attacking you to become compromised. You can use this vulnerability to clean these botnets or get them to stop listening to commands to attack you. Would you perform these actions? Is one more palatable to you than the other? What code of ethics are you basing this decision...
Using about 1000 words or more explain in depth the difference between a denial-of-service attack and...
Using about 1000 words or more explain in depth the difference between a denial-of-service attack and a distributed denial-of-service attack. Research real life stories of the two attacks that happened to a company (or companies) or individuals etc.
Consider a distributed variant of the attack in the previous problem. Assume the attacker has compromised...
Consider a distributed variant of the attack in the previous problem. Assume the attacker has compromised a number of broadband-connected residential PCs to use as zombie systems. Also assume each such system has an average uplink capacity of 512 kbps. * a. What is the maximum number of 500-byte ICMP echo request (ping) packets a single zombie PC can send per second? * b. How many such zombie systems would the attacker need to flood a target organization using a...
For the following problem, define what each each element means in terms of the problem given...
For the following problem, define what each each element means in terms of the problem given below: The following are hours that Joe, John, Tamar, and Alicia spent studying for the test, respectively: 4, 5, 7, 9 The following are scores that Joe, John, Tamar, and Alicia earned for that test, respectively: 9. 8, 12, 14 i. Find the correlation coefficient and interpret what it means in the context of the problem. ii. Find the Least Squares Regression Line and...
1. Complete questions: Define each of the following terms:
1. Complete questions: Define each of the following terms:a. Operating plan; financial planb. Spontaneous liabilities; profit margin; payout ratioc. Additional funds needed (AFN); AFN equation; capital intensity ratio; self-supporting growth rated. Forecasted financial statement approach using percentage of sales e. Excess capacity; lumpy assets; economies of scalef. Full capacity sales; target fixed assets to sales ratio; required level of fixed assets2. Complete problem: Premium for Financial Risk XYZ, Inc. has an unlevered beta of 1.0. They are financed with 50%...
Step 1 Define terms. Explain the following terms in your own words in the discussion forum:...
Step 1 Define terms. Explain the following terms in your own words in the discussion forum: Positive correlation Negative correlation No correlation Step 2 Give real-world examples and post. Offer examples of the following: Two variables that you believe would share a positive correlation Two that you believe would be negatively correlated Two that would not be related at all
Define the following terms as they pertain to translation
Define the following terms as they pertain to translation (see diagram in back)  a. mRNA b. anticodon c. polysome d. ribosomal subunits e. rRNA f. Start and stop codons g. tRNA 
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT