CIT 315 Tutorial Questions
CIT 315 Tutorial Questions
Tutorial Question 1
(a) What is password stealing in computer network?
Password stealing is a process whereby hackers extract digital password using techniques
and tools depending on:
the strength of the password
security of communication channel
client and host machines vulnerabilities
Tutorial Question 2
(a) Briefly discuss the following
(i) Computer worms
A computer worm is a type of malware that, once it infects a machine, can
automatically copy and extend itself to connected devices.
Tutorial Question 3
(a) What is Secure Sockets Layer (SSL) certificate? and what are its uses
Secure Sockets Layer (SSL) is a global standard web security protocol which creates a secure
connection between a website and browser.
SSL ensure that all data passed between a web server and browser remains encrypted and
secure. This encryption technique prevents from hackers to stealing sensitive information
such as credit card details, names and addresses. In case, if a site is secure by SSL then a
padlock is displayed or the address bar shows the URL as https instead of http.
Briefly explain the reason why attacker is worried to know the operating system of his
victim.
The attacker is interested to know the operating system (OS) of his victim because once
the OS is known, its vulnerabilities will be determined and the network will be opened to
attack.
1
(b) Explain any tool that can be used to detect operating system?
Xprobe: it uses Internet Control Message Protocol (ICMP) to determine the remote
OS. It sends many different ICMP queries to the target host.
Tutorial Question 4
(a) What are the three basic criteria for measuring effectiveness of Biometric
(b) List the three human characteristics that are normally considered to be unique in
biometrics.
The three human characteristics that are usually considered truly unique in bioinformatics.
Fingerprints
Retina of the eye (blood vessel pattern)
Iris of the eye (random pattern of features found in the iris, including
freckles, pits, striations, vasculature, coronas, and crypts)
Tutorial Question 5
Explain the following concepts in security
A device that selectively discriminates against information flowing into or out of the
organization
A computing device
Specially configured computer
Combines with routers to define organisation network perimeters.
2
Subjects and objects: A computer can be either the subject of an attack - an
agent entity used to conduct the attack—or the object of an attack — the
target entity.
(iii) Asset: The organizational resource that is being protected: software,
hardware or people.
(b) Define firewall and list the 3 versions which its operation is based on.
Tutorial Question 7
(a) What is Denial-of-Service (DoS) attacks?
Denial-of-service attack (DoS) is a type of attack on a network that is designed to:
bring the network to its knees by flooding it with useless traffic
user is deprived of the services: e-mail, database, file servers, web sites
DoS attack does not usually result in the theft of information or other security
loss
Tutorial Question 8
Explain the following concepts in security
3
Tutorial Question 9
Tutorial Question 10
(a) Give any four examples of the ways to prevent computer worms.
How to Prevent Computer Worms:
1. Install good Anti-virus Software
2. Don’t Download Suspicious Email Attachments
3. Never Download Software from Unreliable Websites
4. Keep All Software Updated
5. Never Open Suspicious Email Attachments
6. Regularly Backup your Important Files
7. Regular Scan your computer
8. Use a Firewall
9. Use SSL Certificate
4
10. Avoid Unsolicited Email
Tutorial Question 11
Explain the following
(i) Mass theft attacks
Mass Theft: hackers run programs that enter stolen username and password details on tens
of thousands of sites until one hit.
(ii) Wi-fi traffic monitoring attacks
Wi-Fi Traffic Monitoring Attacks: hacker uses a simple application available from the internet
for free to watch all traffic on a public Wi-Fi network.
Tutorial Question 12
What is social engineering in the context of information security?
Tutorial Question 13
Explain the following terms
(i) Brute force attacks
Guessing or entering different passwords over and over until it’s
cracked.
“123456” is still the most common password on the planet.
The tools can easily be downloaded for free.
(ii) Dictionary attacks
Common words which can be obtained from dictionary.
Hackers simply run script that tries each of the dictionary words
as password.