Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

authorized parties. We that the data in the computer system may be only accessed

ID: 3725231 • Letter: A

Question

authorized parties. We that the data in the computer system may be only accessed for reading by call it: 9.1 Confidentiality: 9.2 Availability: 9.3 Integrity: 9.4 Stupidity 10. "Traffic Analysis" represents: 10.1 Active security threat; 10.2. "Black hat" security threat; 10.3 Passive security threat; 10.4 Analytical security threat. 11. "Ping of Death" attacks happen when: 11.1 A computer sends Ping to another computer which is not working; 11.2 A user tries to send Ping from the computer not connected to the network; 11.3 A user tries to send Ping from the computer that is infected with "Ping of Death virus; 11.4 Ping is sent in an IP packet larger than 64K 12. In the "Smurfattack" attacker uses: 12.1 Ping packets; 12.2."Traceroute" command; 12.3. “Smurfattack" vins; 12.4 "Smurfattack Trojan horse; 13. The Top Level Domain in the WWW address is defined: 13.1 By the left-most component of the WWW address; 13.2 Always defined as www; 13.3 By the right-most component of the WWW address; 13.4 May not be present in the WWW address; 14. All the computers in one DNS domains: 14.1 Must be in the same physical location: 14.2 Need not correspond to physical location of organizations; 14.3 Must be on the same LAN 14.4 Must use the same type of Operating System; 15. Worms: 15.1 Are self-contained programs and use a network vehicle to replicate themselves; 15.2 Need a host program for replication; 15.3 Whenever the infected computer comes into contact with an uninfected piece of software, a fresh copy of the worm passes into the new program; 15.4 Infect documents, not executables

Explanation / Answer

9. 9.1 Confidentiality
Confidentiality, in the context of computer systems, allows authorized users to access sensitive and protected data.

10. 10.3 Passive security threat
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. Passive attacks are in the nature of eavesdropping on, or monitoring transmissions. The goal of the opponent is to obtain information that is being transmitted.

11. 11.4 Ping is sent in an IP packet larger than 64K.
ping of death is a denial of service (DoS) attack involving deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol. One of the features of TCP/IP is fragmentation is that it allows a single IP packet to be broken down into smaller segments. Attackers take advantage of that feature when they found that a packet broken down into fragments can add up to more than the allowed 65,536 bytes. Many operating systems didn't know what to do when they received an oversized packet, so they froze or crashed.

12 12.1 Ping packets.
In smurf attack ping is issued to the IP broadcast address. This causes every computer to respond to the bogus ping packets and send reply to the targeted computer, which gets flooded with the replies.

13 13.3 By the right-most component of the WWW address
Top level domain is the right most part of the www address.Examples of some of the popular TLDs include .com, .org, .net, .gov, .biz and .edu

14 14.2 Need not correspond to physical location of the organization.

15 15.1 Are self-contained programs and use a network vehicle to replicate themselves.
computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.[1] Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth.