0% found this document useful (0 votes)
66 views

Assignment 2 (2583)

Riphah International University's Faculty of Computing assignment discusses cyber security. It provides solutions for three questions: 1) how to rob a shop by breaking in, getting keys, and defeating locks; 2) attacking a web application through cross-site scripting, forum attacks, cookie theft, and SQL injection; and 3) defending against phishing, DDoS attacks, and DNS spoofing. The document outlines various hacking and cyber attack techniques and corresponding defensive strategies.

Uploaded by

Musheeza Liaqat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Assignment 2 (2583)

Riphah International University's Faculty of Computing assignment discusses cyber security. It provides solutions for three questions: 1) how to rob a shop by breaking in, getting keys, and defeating locks; 2) attacking a web application through cross-site scripting, forum attacks, cookie theft, and SQL injection; and 3) defending against phishing, DDoS attacks, and DNS spoofing. The document outlines various hacking and cyber attack techniques and corresponding defensive strategies.

Uploaded by

Musheeza Liaqat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

RIPHAH INTERNATIONAL UNIVERSITY

Faculty of Computing

CYBER SECURITY
Assignment 2

Submitted by: Musheeza Liaquat

Submitted to: Ma’am Tehreem

Sap ID: 2583

Dated: 8, November 2020


Solution Question 1

Rob a Shop

Break In Get Keys Defeat Lock

PICK lock Force Open

Attack Fight Window SE SE


Employees Guard
SE
SE SE

Bribe Threaten GET Duplicate


Blackmail
employees employees Keys
NSE
NSE NSE SE
Solution Question 2

Attack Web Application

Cross Site Scripting


Attack
c

Forum SET HTTP


Message Web Use
Attack
Boards page Escaping/Encoding
Flag only
Attack

Break Valid
Tags

Sanitize HTML

Cookie Theft

Browsing History Usernames Password

2nd auth.

factor
Malware

Browser os

Change
Key fobs Pin pad
password
regularly
Attack Web Application

Phishing

Email Whaling Spear Spam filters


Phishing Phishing

Verify Email for Implement multi- Employee


layer security Awareness
Attack systems

Sql Injection Attack

c
c
c
c

Use of least Don’t use shared


Get credentials GET DB Delete data
privilege Database
of other users access from rows
Attack Web Application

DDOS DNS
Attack spoofing

Set short Clear DNS


Rate limit Add filter TTL Times Caches regularly
Use firewall
Server’s router to router
The End

You might also like