COMP1427: Cyber Security |
- Websites are vulnerable to attacks from a number of different sources including denial-of-service, SQL injection, and tampering of the website code. [Based on articles from ITNow BCS publication 2020]
- Compare and contrast the security weaknesses of the two main types of programming that are associated with websites that enable remote users to request dynamic content and services over the Internet. Use a diagram to illustrate your answer.
- Discuss the potential effects that distributed denial of service attacks could have on a web server of an e-commerce website. (10 marks)
- One way of ensuring the integrity of the programming code of a website and that it has not been tampered with is by hashing the code and periodically checking that the hash remains the same. Show how a 4-bit hash may be prepared on a code sample of Hex AB using the seed of Hex 6 and using the algorithms used in the lectures. Show all your working and give your hash in Hex.
- Password hashes, because passwords are much shorter, can be cracked by Rainbow Tables. Explain what Rainbow Tables are and how used.
The post COMP1427: Cyber Security Websites are vulnerable to attacks from a number of different sources including denial-of-service, SQL injection, and tampering of the website code. [Based on articles from ITNow BCS publication 2020] appeared first on My Academic Papers.