Top » Catalog » IMT-CDL-Old »


IMT-93: Different Types of Attacks-MT1

IMT-93: Different Types of Attacks-MT1















1. What are Buffer Overflows? Give an example of a source code that can be overflowed.

2. Describe in detail three different types of Buffer Overflows.

3. How can Buffer Overflows be prevented?

4. Trojans, Keyloggers, Sniffers and Spyware are examples of tools that assist IP theft. Describe some similarities and differences between each one of them.

5. What are some of the challenges associated with remotely installing IP theft tools on the target system?

6. How can you avoid anti-virus detection while installing IP theft tools on the target system?

7. Describe counter-measures that can be implemented on a system to prevent IP theft.

8. What is Steganography? How can you detect the presence of data that is steganographically hidden inside an image?

9. If you are a disloyal, disgruntled employee and want to steal data from your organisation, then which technique would you use?

10. What is Dumpster Diving? Why does an attacker usually carry it out?


1. What are routing tables? What are they used for?

2. Describe three different types of DOS attacks. How are they executed? Suggest some counter-measures.

3. Describe three different types of distributed DOS attacks. How are they executed? Suggest some countermeasures.

4. What is the key difference between DOS attacks and distributed DOS attacks?

5. Describe a hybrid DOS attack that has not been described in this course.

6. What security solutions would you implement in your organisation to prevent your employees from stealing data?

7. What is USB Hacking? What all can be done by an attacker using USB Hacking? How can you prevent USB Hacking?

8. What is an attacker usually trying to do while performing shoulder surfing?

9. What are Keyloggers? What makes them so dangerous?

10. How can an attacker prevent IP theft through cellphones?


1. You will need two different systems for this particular lab session. On one system install the victim part of the Trojan while on the other system install the attacker part of the Trojan. Now use the attacker part of the Trojan to control the victim part and do things on its screen. (Kindly submit actual screenshots as your answer.)

2. Carry out Dumpster Diving on a particular victim for a consecutive period of 10 days and collect all private, confidential information that you can about the victim. Please note that every student is required to take prior permission from the victim before carrying out this exercise. (Kindly submit actual items that you collect via Dumpster Diving as your answer.)

Quick Find
Use keywords to find the product you are looking for.
Advanced Search
1 x IMT-59: Financial Management-MT1
1 x IMT-63: Group Dynamics & Managing Change-MT1
1 x IMT-00: Computer in Management CAM-MT1
1 x IMT-24: Quantitative Techniques-MT1
1 x IMT-10: Business Communication-MT1
1 x IMT-57: Financial Accounting-MT2
1 x IMT-13: Management Union Relations-MT2
1 x IMT-70: Marketing of Service Industries-MT2
1 x IMT-12: Human Resource Management-MT1
1 x IMT-54: Business Law-MT3
1 x IMT-12: Human Resource Management-MT3
1 x IMT-50: Consumer Behavior-MT1
1 x IMT-81: Retail Management-MT1
1 x IMT-36: Java Programming-MT1
1 x IMT-68: Labor Law-MT1
1 x IMT-100: Software Project Management-MT1
1 x IMT-93: Different Types of Attacks-MT1
1 x IMT-81: Retail Management-MT2
1 x NLU-06: IT Act and Internet Governance-MT1-14
1 x IMT-77: E-Business-2016
1 x IMT-17: International Marketing-2014
1 x IMT-62: Strategic HRD-2014
1 x IMT-70: Marketing Of Service Industry-2014
1 x IMT-74: Managing Human Resource in Global Environment-2014
1 x IMT-15: Production and Operations Management-2014
1 x IMT-13: Management Union Relation-2014
1 x IMT-86: International financial management-2014
1 x IMT-01: Management Process and Organization-2014
1 x IMT-36: Java Programming-2014
1 x IMT-101: Networking and Telecom Management-16
1 x IMT-12: Human Resource Management-2014
1 x IMT-57: Financial Accounting-2014
1 x IMT-98: System Forensics-2014
1 x IMT-75: Brand Management-2014
1 x IMT-20: Managerial Economics-2014
1 x IMT-139-Enterprise Response Planning-16
1 x IMT-63: Group Dynamics and Managing Change-2014
1 x IMT-24: Quantitative Technique-2014
1 x IMT-40: Marketing management-2014
1 x IMT-54: Business Law-2014
1 x IMT-14: Organization Structure and Behaviour-2014
1 x NLU-08: CyberCrimesComputerForensicsAndDigitalEvidence-14
1 x IMT-31: Web Technology-2014
1 x IMT-60: Training And Development-2014
1 x IMT-102: Database Adminitration-2014
1 x IMT-58: Management Accounting-2014
1 x IMT-72: Rural Marketing-2014
1 x CAM-Computer Aided Management-2014
1 x IMT-95: Security Solutions-2014
1 x IMT-41: Indian Financial Services-2014
1 x IMT-92: Network Security-2014
1 x IMT-49: Business Ethics-2014
1 x IMT-93: Different Types of Attacks-2014
1 x IMT-18: Export Finance and Documentation-2014
1 x IMT-96: Software Hacking-2014
1 x IMT-48: DOT Net Programming-2014
1 x NLU-07: Informational Technology Management-14
1 x IMT-65: MIS-Management Information Systems-2014
1 x NLU-03: Intellectual Property Rights in Digital Environment-I-14
1 x IMT-10: Business Communication-2014
1 x IMT-97: Mobile Platforms Security-2014
1 x IMT-94: Network Security Threats Attacks and Loopholes-2014
1 x IMT-05: Advertisement and Sales Promotion-2014
1 x IMT-09: Security Analysis and Portfolio Management-2014
1 x IMT-91: Basics of Security-2014
1 x IMT-100: Software Project Management-2014
1 x IMT-61: Corporate Finance-2014
1 x IMT-11: Managing People-2014
1 x IMT-59: Financial Management-2014
1 x IMT-16: International Trade-2014
1 x IMT-07: Working Capital Management-2014
1 x NLU-04: E-Banking n Electronic Payment System-14
1 x NLU-05: Intellectual Property Rights in Digital Environment-II-M
Share Product

osCommerce Online Merchant Copyright © 2010 osCommerce
osCommerce provides no warranty and is redistributable under the GNU General Public License
Note: We provide all Solutions and Contents for Reference/Study purpose only.