Unit 03 CS
Unit 03 CS
A proxy server acts as an intermediary between a user's device (like a computer or smartphone)
and the internet. When you request a webpage or any other resource online, your request first
goes to the proxy server. The proxy server then fetches the requested resource from the
internet and forwards it to your device.
Phishing is a type of cybercrime where attackers attempt to deceive individuals into revealing
sensitive information, such as usernames, passwords, and credit card details.
Q3. What do you mean by keylogging (Keystroke logging)? Discuss key logger and give
its classifications.
Keylogging, also known as keystroke logging, is the process of recording keystrokes made on a
keyboard.
Keyloggers are software or hardware devices that capture and record every key pressed on a
keyboard.
Classifications of Keyloggers:
● Software Keyloggers: These are programs installed on the target computer. They can be
installed by malicious software, downloaded unknowingly by the user, or even pre-installed on
the device.
● Hardware Keyloggers: These are physical devices that are inserted between the keyboard
and the computer. They capture keystrokes directly from the keyboard.
A computer virus is a malicious program that can replicate itself and spread from one computer
to another.
A backdoor is a hidden entry point into a computer system or network that allows unauthorized
access.
Function of a Backdoor:
● Remote Access: Attackers can use backdoors to gain remote access to the system, allowing
them to control it remotely.
● Data Exfiltration: Backdoors can be used to steal sensitive data from the system.
● Persistence: Attackers can use backdoors to maintain persistent access to the system, even
after security measures are implemented.
● Command and Control: Backdoors can be used to establish a command-and-control
channel for attackers to communicate with the compromised system.
Q9. What is SQL injection and what are different counter measures to prevent the attack.
SQL injection is a type of cyberattack where malicious SQL code is injected into a web
application's input fields, allowing attackers to manipulate the application's database.
Q10. What is buffer overflow? What are different buffer overflow attacks?
A buffer overflow occurs when a program attempts to write more data to a memory buffer than it
can hold. This can overwrite adjacent memory locations, potentially causing the program to
crash or allowing attackers to execute malicious code.