Top » Catalog » IMT-CDL-Old »


IMT-93: Different Types of Attacks-MT1

IMT-93: Different Types of Attacks-MT1















1. What are Buffer Overflows? Give an example of a source code that can be overflowed.

2. Describe in detail three different types of Buffer Overflows.

3. How can Buffer Overflows be prevented?

4. Trojans, Keyloggers, Sniffers and Spyware are examples of tools that assist IP theft. Describe some similarities and differences between each one of them.

5. What are some of the challenges associated with remotely installing IP theft tools on the target system?

6. How can you avoid anti-virus detection while installing IP theft tools on the target system?

7. Describe counter-measures that can be implemented on a system to prevent IP theft.

8. What is Steganography? How can you detect the presence of data that is steganographically hidden inside an image?

9. If you are a disloyal, disgruntled employee and want to steal data from your organisation, then which technique would you use?

10. What is Dumpster Diving? Why does an attacker usually carry it out?


1. What are routing tables? What are they used for?

2. Describe three different types of DOS attacks. How are they executed? Suggest some counter-measures.

3. Describe three different types of distributed DOS attacks. How are they executed? Suggest some countermeasures.

4. What is the key difference between DOS attacks and distributed DOS attacks?

5. Describe a hybrid DOS attack that has not been described in this course.

6. What security solutions would you implement in your organisation to prevent your employees from stealing data?

7. What is USB Hacking? What all can be done by an attacker using USB Hacking? How can you prevent USB Hacking?

8. What is an attacker usually trying to do while performing shoulder surfing?

9. What are Keyloggers? What makes them so dangerous?

10. How can an attacker prevent IP theft through cellphones?


1. You will need two different systems for this particular lab session. On one system install the victim part of the Trojan while on the other system install the attacker part of the Trojan. Now use the attacker part of the Trojan to control the victim part and do things on its screen. (Kindly submit actual screenshots as your answer.)

2. Carry out Dumpster Diving on a particular victim for a consecutive period of 10 days and collect all private, confidential information that you can about the victim. Please note that every student is required to take prior permission from the victim before carrying out this exercise. (Kindly submit actual items that you collect via Dumpster Diving as your answer.)

Quick Find
Use keywords to find the product you are looking for.
Advanced Search
1 x IMT-71: Competitive Analysis & Marketing Strategy-MT1
1 x IMT-12: Human Resource Management-MT1
1 x IMT-30: Sales and distribution management-MT1
1 x IMT-64: Leadership-MT1
1 x IMT-58: Management Accounting-MT3
1 x IMT-94: Network Security Threats Attacks and Loopholes-MT1
1 x IMT-92: Network Security-MT1
1 x IMT-81: Retail Management-MT1
1 x IMT-13: Management Union Relations-MT2
1 x IMT-77: E-Business-MT1
1 x IMT-17: International Marketing-MT2
1 x IMT-50: Consumer Behavior-MT1
1 x IMT-23: Inventory Management-MT2
1 x IMT-03: Marketing Research-MT2
1 x IMT-87: Risk Management-MT1
1 x IMT-20: Managerial Economics-MT3
1 x IMT-26: Project Management-MT1
1 x IMT-07: Working Capital Management-MT2
1 x IMT-91: Basics of Security-MT1
1 x IMT-09: Security Analysis & Portfolio Management-MT1
1 x IMT-24: Quantitative Techniques-MT2
1 x IMT-18: Export Finance & Documentation-MT2
1 x IMT-31: Web Technology-MT1
1 x IMT-86: International Financial Management-MT1
1 x IMT-11: Managing People-MT1
1 x IMT-36: Java Programming-MT1
1 x IMT-61: Corporate Finance-MT1
1 x IMT-14: Organizational Structure & Behaviour-MT3
1 x IMT-55: Total Quality Management-MT1
1 x IMT-101: Networking and Telecom Management-MT1
1 x IMT-79: Economic Environment in India-MT2
1 x IMT-82: Retail Shopper's Behaviour-MT2
1 x IMT-16: International Trade-MT1
1 x IMT-10: Business Communication-MT3
1 x IMT-56: Strategic Management-MT1
1 x IMT-75: Brand Management-MT2
1 x IMT-19: Indian Foreign Trade-MT2
1 x IMT-89: Material Requirement and Planning-MT1
1 x IMT-09: Security Analysis & Portfolio Management-MT2
1 x IMT-57: Financial Accounting-MT2
1 x IMT-14: Organizational Structure & Behaviour-MT2
1 x IMT-57: Financial Accounting-MT1
1 x IMT-76: Industrial Marketing-MT2
1 x IMT-13: Management Union Relations-MT1
1 x IMT-59: Financial Management-MT1
1 x IMT-23: Inventory Management-MT1
1 x IMT-74: Managing Human Resource in Global Environment-MT2
Share Product

osCommerce Online Merchant Copyright © 2010 osCommerce
osCommerce provides no warranty and is redistributable under the GNU General Public License
Note: We provide all Solutions and Contents for Reference/Study purpose only.