Podcast
Questions and Answers
Describe the following terms:
(a) [1 mark] State actor attackers
(b) [1 mark] Zero-day vulnerabilities
(c) [1 mark] Script Kiddies
Describe the following terms: (a) [1 mark] State actor attackers (b) [1 mark] Zero-day vulnerabilities (c) [1 mark] Script Kiddies
(a) [1 mark] Governments are increasingly employing their own state-sponsored attackers for launching cyberattacks against their foes. These attackers are known as state actors (b) [1 mark] Vulnerabilities can be exploited by attackers before anyone else even knows it exists. This type of vulnerability is called a zero day because it provides zero days of warning (c) [1 mark] Individuals who want to perform attacks, yet lack technical knowledge to carry them out. They download freely available automated attack software and use it to attack
In context of vulnerability scanning, explain:
(a) Intrusive scan
(b) nonintrusive scan
In context of vulnerability scanning, explain: (a) Intrusive scan (b) nonintrusive scan
(a) An intrusive scan attempts to employ any vulnerabilities that it finds, much like a threat actor would (b) A nonintrusive scan does not attempt to exploit the vulnerability but only records that it was discovered
In context of memory vulnerabilities, explain buffer overflow attack and integer overflow attack
In context of memory vulnerabilities, explain buffer overflow attack and integer overflow attack
(a) Buffer overflow attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer. This extra data overflows into the adjacent memory locations (b) Integer overflow attack changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow. For example, withdrawing $1 from an account that has a balance of 0, which could cause a new balance of $4,294,967,295
In context of ’application development concepts’, explain the waterfall model and agile model
In context of ’application development concepts’, explain the waterfall model and agile model
Signup and view all the answers
(a) [2 marks] In context of hash functions, describe collision, and collision attacks.
(b) [1 mark] Provide at least one reason for which a hash algorithm that is subject to collision attacks no longer will be used in the cryptographic sector.
(a) [2 marks] In context of hash functions, describe collision, and collision attacks. (b) [1 mark] Provide at least one reason for which a hash algorithm that is subject to collision attacks no longer will be used in the cryptographic sector.
Signup and view all the answers