Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question No. 1 In your own words, define each of the following terms: a) Spyware

ID: 3581992 • Letter: Q

Question

Question No. 1 In your own words, define each of the following terms:

a) Spyware and Adware and.

b) Phishing and Spear phishing.

c) SQL injection.

Question No. 2 In your own words: a) Define denial-of-service attack. b) Do you agree with the statement says “it is morally acceptable to use a denial-of-service attack to shut down a Web server that distributes child pornography”?

Question No. 3 By considering the benefits and risks of online voting, Evaluate in your own words the online voting in term of Kantian Analysis.

Explanation / Answer

A) Spyware:- Spyware is a software used to spy on the user who is using the system. Generally user is unaware of this spyware on his computer. This can be installed with some other software installation which you are intensionally doing but you dont know about the spyware installation.

Once spyware is attacked the hacker can know all the movements of the user i.e. Web searches, Keystrokes, Personal information, Bank details and passwords like that. Withe spyware the system performance is also get defected i.e.the operational speed is completly slow down like that.

-->Adware:- Adware is a advertisement supported software which shows advertisements automatically when installing softwares or accessing some websites. Generally this adware is bundled with the software by the developer inorder to recover its investment and further enhancements to the software.

Some people make this advertisements and post those advertisements when is he is accessing some websites or accesssing any information in web. Even there are some softwares which comes with advrtisements in free version and some extra options with no advertisements in the paid versions.

B) Phishing:- This is the type of attack and an example of social engineering attack which knows the weakness in the current websecurity. Phishing is used to obtain the some personal or confidential information of the users.Generally these occur's by sending email's and instant messaging.

Hacker's sends the link to the mail or someway inorder to register or to fill some personal information of the users. Actually this links redirected to their own websites which is almost all equal to the some trusted website.

So whenever the users enters personal information or bank details these are used for some malicious purposes.

-->Spear Phishing:- Spear phishing is one type of phishing attack which is targeted on specific person or one organisation. Attackers get the information of these specific people or organisation and use this information for malicious purposes

C) SQL Injection:- SQL Injection attacks are happened where the SQL is allowed to get the information on webpages by giving thier input values in webpages. In this cases hackers will inject the SQL Statements with those inputs and get the required information.

This allows the complete disclosure of data which is in database or make the database unavailable to the administraotrs untill the hackers complete their work. SQL Injection is one of the top web applications vulnarabilites happened.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote