Assignment -3 ISH
Assignment -3 ISH
CO3: Identify the different network and perimeter attacks and understand the concept of
network security.
SECTION A (2 × 5 = 10 Marks)
SECTION B (7 × 3 = 21 Marks)
Answer the following questions. Each question has two parts and carries 7 marks.
1. Explain how botnets are used in Distributed Denial of Service (DDoS) attacks. What
challenges do organizations face in defending against such attacks?
2. Explain Vulnerability Exploitation and provide examples of tools used for it.
3. Discuss the concepts of log analysis and log clearing in detail.
Answer the following questions. Each question has two parts and carries 11 marks.
1. Define SQL injection and outline a basic method for carrying out this attack. What are some
security measures that can prevent SQL injection vulnerabilities in web applications?
2. A system administrator notices suspicious activity on their server. Describe how they could
use password-cracking tools to test the security of their systems. What measures could they
implement to mitigate the risks associated with weak passwords?
3. Explain the process and purpose of privilege escalation in system hacking. Evaluate different
privilege escalation techniques an attacker might use in a Windows environment. Discuss
how an organization can assess and mitigate these techniques to strengthen its security
posture.