0% found this document useful (0 votes)
4 views

Assignment 3

The document is an assignment for B. Tech 2nd Year students at Rajkiya Engineering College, Banda, focusing on Cyber Security. It contains six questions covering topics such as identity theft, wireless network components, buffer overflow, proxy servers, password cracking, and various cyber threats. Students are required to discuss techniques, prevention methods, and provide short notes on specific cyber security terms.

Uploaded by

singhabhi983886
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Assignment 3

The document is an assignment for B. Tech 2nd Year students at Rajkiya Engineering College, Banda, focusing on Cyber Security. It contains six questions covering topics such as identity theft, wireless network components, buffer overflow, proxy servers, password cracking, and various cyber threats. Students are required to discuss techniques, prevention methods, and provide short notes on specific cyber security terms.

Uploaded by

singhabhi983886
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

RAJKIYA ENGINEERING COLLEGE, BANDA

Department of Information Technology


Assignment-3
B. Tech 2 Year / 3rd Semester (2023-24)
nd

Cyber security (BCC-301)

Question-1 What are different techniques of identity theft (ID theft)? How to prevent being a victim
of ID theft ?
Question-2 What are different components of wireless network? Discuss some of the traditional
techniques of attacks on wireless networks.

Question-3 What is buffer overflow? What are different buffer overflow attacks ? How to minimize
buffer overflow attacks?
Question-4 Describe the role of proxy servers and anonymizers in cyber security. Discussing how
they work to enhance privacy and security for internet users.

Question-5 Discuss the various methods and techniques involved in password cracking, keyloggers,
and spywares, emphasizing the risks and consequences of these cyber security threats.

Question-6 Write short notes on

1-Virus 2- worms
3- DDOS 4-backdoor Trojans 5- firewall

You might also like