Question
8. Explain the following terms as employed in security. (5 x 2 marks) i) Denial of Service (DoS) attack ii) Man in the middle attack
8. Explain the following terms as employed in security. (5 x 2 marks) i) Denial of Service (DoS) attack ii) Man in the middle attack iii) Brute force attack iv) DNS Hijacking v) IP Spoofing 9. Explain the difference between asymmetric and symmetric encryption. (5 marks) 10. What are the common threats faced by a web application? (10 marks) 11. Explain how you can make the user authentication process more secure. Identify at least three possible solutions. (10 marks) 12. Explain how you can secure a freshly installed Web Server before deploying your web application. (10 marks)
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started