Question: Part 1: (Answer All) - 50%(100 Points) 1. Statement: Find the countermeasures to prevent the recently mentioned attack techniques 2. Find the system threats and

Part 1: (Answer All) - 50%(100 Points)

1. Statement: Find the countermeasures to prevent the recently mentioned attack techniques

2. Find the system threats and vulnerability so that we can prevent the attack techniques.

3. Prepare a list of web security policies currently used.

4. Write a report on secure web browsing, website defacements and web attacks. Briefly describe what these are and your recommendation on how to stay secure on the internet.

5. Find key differences, advantages and disadvantages of HTTP & HTTPS protocol

6. Explain Brute force attack techniques?

7. Explain 5 principles of Open Web Application Security Project (OWASP)?

8. Explain the key difference between same-origin policy (SOP) and cross-origin resource sharing (CORS)?

9. Explain the working of asymmetric cryptography?

10. What are cookies and try to explain with a real scenario?

Part 2: (Answer Any 5) - 50% (100 Points) Write a detailed report of at least 2 full pages(per topic) on any 5 topics..

Project Research Topic

Why should you avoid public Wi-Fi?

Security breaches of remote working

How to prevent social engineering attacks

Are wireless internet connections less secure than LAN ones? If so, why?

Does the use of biometrics increase security?

What is clickjacking?

How secure are cloud services?

Discuss the functions and risks of cookies and cache files.

How does hacking a phone differ from hacking a computer?

How does ransomware work?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!