0% found this document useful (0 votes)
15 views

Assignment 1 (FA17-bce-081) - DCCN

This document contains an assignment submitted by Aisha Khan with roll number FA17-BCE-081-B. The assignment includes three questions and answers. Question 1 defines threats and attacks in the context of network security. Question 2 lists some common security attacks such as DDoS, malware, Wi-Fi eavesdropping, and ransomware. Question 3 discusses reasons for companies to hire ethical hackers, including detecting sophisticated attacks, reducing security breaches to protect company credibility, and ensuring network/system security.

Uploaded by

Aisha Khan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Assignment 1 (FA17-bce-081) - DCCN

This document contains an assignment submitted by Aisha Khan with roll number FA17-BCE-081-B. The assignment includes three questions and answers. Question 1 defines threats and attacks in the context of network security. Question 2 lists some common security attacks such as DDoS, malware, Wi-Fi eavesdropping, and ransomware. Question 3 discusses reasons for companies to hire ethical hackers, including detecting sophisticated attacks, reducing security breaches to protect company credibility, and ensuring network/system security.

Uploaded by

Aisha Khan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Name: Aisha Khan

Roll no. FA17-BCE-081-B

Assignment # 1

Q1:
Answer:
Threat: Threat is a potential danger that, in context of network security, might lead to data stealth, loss of
credibility, software attacks or any other type of intrusion.
Attack: Attacks are the illegal/unauthorized acts which provides the attacker access to the critical data of
the organization/company. Attacks could be made to harm the organization by erasing the data or by
sending potentially harmful data to its clients.
Q2:
Answer:
Some of the most common security attacks are as follows:

 DDOS
 Malware
 Wi-Fi Evesdropping
 Ransomware
 Password
 Cross-site Scripting
 Drive-by attack

Q3:
Answer:

Topic: Reasons for Companies to hire ethical hackers

Due to the advancement in technology there is a need to prevent cyberattacks. Companies are trying to
take possible precautions. The best way is to hire an ethical hacker also called as a white hat hacker.
The white hat hacker would be able to find any loopholes or vulnerabilities in the system/network and fix
them so that the system/network will be secure from the attackers.
There are multiple reasons for a company to hire an ethical hacker. Now a days cyberattack are more
sophisticated and undetectable, an ethical hacker helps define detection rules to eliminate the chances of
various attack.
A security breach can harm the company’s credibility, an ethical hacker will reduce the chances of such
breaches. There are many other reasons the companies hire ethical hackers. The companies that hire
ethical hackers can surely not compromise on the security of their network/system.

You might also like