HW Assignment 9
HW Assignment 9
(10 points) Explain the correlation between OSI and TCP/IP model. Then provide example
protocols for Applications and Transport layers in TCP/IP model.
(5 points) Explain the difference between TCP and UDP Transport protocols.
TCP UDP
Connection-Oriented Connectionless
Reliable Unreliable
(4 points) Answer the following questions based on the format of a TCP packet:
Encryption is the process in which we convert plain text into ciphertext. Ciphertext means a random
and meaningless text which cannot be understood without decryption.
(10 points) How is a Brute-force attack different from the Dictionary attack?
Brute-force: A brute force attack is when a Hacker tries all possible combinations of a password to
get the password. This is resource intensive as there can be so many possible combinations. The
possible number of combinations for an 8-character password with alphabets and numbers. The
longer the password more time needed to crack.
Dictionary attack: A dictionary attack is a kind of brute-force attack where the hacker, does not try
all possible combinations but only tries the password from a dictionary file. The file will have some of
the most used passwords and some combination of those. Attackers commonly publish password
dictionaries after attacks so that they can be used in the future by other hackers.
(5 points) Suppose you want to create password using lowercase (a~z) and uppercase (A~Z) English
alphabet characters, as well as numbers 0~9. How many possible passwords can be generated if
the length of the password is 5?
26+26+10 =62
Malware or virus are interchangeable terms. It means accessing the device without the owner’s
permission.
Adware typically collects the types of websites that you visit so advertisers can display
custom advertisements.
Spyware, like adware, will often send your browsing activities to advertisers.
Computer Virus primary characteristic of a computer virus is malicious software that cyber
criminals program to reproduce. It usually does so by attacking and infecting existing files on
the target system.
Worm are infectious and cybercriminals design them to replicate themselves. However, a
worm replicates without targeting and infecting specific files that are already present on a
computer.
Trojan is a malicious program that misrepresents itself to appear useful. Cybercriminals
deliver Trojans in the guise of routine software that persuades a victim to install it on their
computer.
(10 points) Define malware payload. What are the main characteristics of malware payload?
A payload is the component of the attack which causes harm to the victim. Attack vectors such as
viruses, worms, and malware can all contain one or more malicious payloads.
Where a worm differs from a virus is that it typically doesn’t infect or manipulate files on its own.
Instead, it simply clones itself repeatedly and spreads via a network (say, the Internet, a local area
network at home, or a company’s intranet) to other systems where it continues to replicate itself.
(4 points) Find the efficiency and overhead for asynchronous transmission of a single 8-bit ASCII
(American Standard Code for Information Interchange) character with one start bit and one stop
bit
Efficiency:
8
Eff = (10∗100 %) =80 %
Overhead:
(8 points) What is noise, and SNR? Explain different types of noise and where each type of noise is
found.
The unwanted electrical signal disturbance in the electrical signals is called noise.
Signal to Noise Ratio (SNR) measure used to compare the level of the desired signal to background
noise.
Examples of noise: