Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

8. Explain the following terms as employed in security. (5 x 2 marks) i) Denial of Service (DoS) attack ii) Man in the middle attack

8. Explain the following terms as employed in security. (5 x 2 marks) i) Denial of Service (DoS) attack ii) Man in the middle attack iii) Brute force attack iv) DNS Hijacking v) IP Spoofing 9. Explain the difference between asymmetric and symmetric encryption. (5 marks) 10. What are the common threats faced by a web application? (10 marks) 11. Explain how you can make the user authentication process more secure. Identify at least three possible solutions. (10 marks) 12. Explain how you can secure a freshly installed Web Server before deploying your web application. (10 marks)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Essential Practices For Managing Chemical Reactivity Hazards

Authors: Robert W. Johnson, Steven W. Rudy, Stephen D. Unwin

1st Edition

0816908966, 978-0816908967

More Books

Students also viewed these Chemical Engineering questions