Assignment 3
Assignment 3
Question-1 What are different techniques of identity theft (ID theft)? How to prevent being a victim
of ID theft ?
Question-2 What are different components of wireless network? Discuss some of the traditional
techniques of attacks on wireless networks.
Question-3 What is buffer overflow? What are different buffer overflow attacks ? How to minimize
buffer overflow attacks?
Question-4 Describe the role of proxy servers and anonymizers in cyber security. Discussing how
they work to enhance privacy and security for internet users.
Question-5 Discuss the various methods and techniques involved in password cracking, keyloggers,
and spywares, emphasizing the risks and consequences of these cyber security threats.
1-Virus 2- worms
3- DDOS 4-backdoor Trojans 5- firewall