0% found this document useful (0 votes)
10 views3 pages

Word

Uploaded by

d727fn99j9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views3 pages

Word

Uploaded by

d727fn99j9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Name: _____________________________________________ KAU ID:

ELIS 120 Speaking Project Step 3 Form


Step 3: Complete the requested information about each source. Then write a paragraph
about what you learned from each source here:

Source 1 Title: A site for training on hacking, its solution for electronic stores
Website URL/Where you found it: https://youtu.be/IrcZq21DTkA?si=_R7Ndh_WOg0kRlNe

Source 2 Title: How Websites Are Hacked in 2024 and Useful Tips on How to Prevent It.
Website URL/Where you found it: https://www.hostinger.com/tutorials/how-websites-are-hacked

Advanced DDoS protection – our hosting infrastructure is secured with cutting-edge DDoS protection mechanisms
to shield your website against the disruptions caused by DDoS attacks.Continuous monitoring – the Hostinger
security team constantly monitors our systems for unusual behavior, identifying and addressing potential security
issues.Secure email hosting – our business email hosting service incorporates spam filters and malware scanning
tools to protect customers from phishing attempts.Automated backups – all our web hosting plans incorporate
automated website backup solutions to reduce the potential impact of data breaches or accidental data loss.Free
SSL certificates – Hostinger plans provide unlimited free SSL certificates at no additional cost, ensuring that
communication between your website and visitors is encrypted and secure.Application Firewall (WFA) – our plans
come with a sophisticated web application security firewall that filters HTTP traffic for third-party access. It offers
data breach prevention by protecting your website from a variety of application-layer attacks, such as SQL
injections and cross-site scripting. Two-Factor Authentication – with Hostinger, you can enable two-factor
authentication for your account, adding an extra level of security that neutralizes attacks such as phishing and brute
force. ModSecurity integration – ModSecurity, an open-source intrusion detection and prevention system, is
integrated into Hostinger’s servers to filter incoming traffic and block SQL injection attacks
Source 3Title: Ethical Hacking Techniques and The Perfect Tools.
Website URL/Where you found it: https://www.knowledgehut.com/blog/security/ethical-hacking-
techniques

Social engineering is used to convince people to reveal their confidential information. The attacker
deceives the people by taking advantage of their trust and lack of knowledge. There are three types of social
engineering - human-based, mobile-based, and computer-based. Ettercap includes the features of host and
network analysis. In addition, Ettercap has got the capability of sniffing an SSH connection. It allows you to
create custom plugins using API. John the Ripper is one of the most popular password-cracking tools. The
tool is used to test the strength of the password. Brute force technology is used by this tool to hack
passwords. Nmap is an open-source security tool. This tool is mainly used to manage and audit network and
system security. Usually, Information Security professionals use this tool to find malware, network audits,
network mapping, and more for local and remote hosts.

Source 4Title: Website Hacking Techniques Most Commonly Used by Hackers


Website URL/Where you found it: https://www.getastra.com/blog/knowledge-base/website-hacking-
techniques/amp/

Use strong passwords and 2-factor authentications wherever possibleKeep your plugins andsoftware
updated with the latest security patchesUse strong firewalls to prevent DDoS attacks and block unwanted
IP addressesMaintaining proper code sanitization can help stop SQL injection attacksAvoid clicking on any
unknown links or opening attachments in email from unknown sourcesRegular security audits to keep
track of your website’s securityWebsites are always vulnerable to such attacks and one needs to be vigilant
round the clock. To monitor your website’s security, Astra’s security firewall is the best option for you.

Grade for Step 3:

Task Achievement
Source 1 Para. Source 2 Para. Source 3 Para. Source 4 Para. Clear Source Info Late Penalties Total
/4 /4 /4 /4 /3 /19
Teacher’s Signature: ____________________________ Date: ______________

You might also like