Top » Catalog » IMT-CDL-Old »


IMT-93: Different Types of Attacks-MT1

IMT-93: Different Types of Attacks-MT1















1. What are Buffer Overflows? Give an example of a source code that can be overflowed.

2. Describe in detail three different types of Buffer Overflows.

3. How can Buffer Overflows be prevented?

4. Trojans, Keyloggers, Sniffers and Spyware are examples of tools that assist IP theft. Describe some similarities and differences between each one of them.

5. What are some of the challenges associated with remotely installing IP theft tools on the target system?

6. How can you avoid anti-virus detection while installing IP theft tools on the target system?

7. Describe counter-measures that can be implemented on a system to prevent IP theft.

8. What is Steganography? How can you detect the presence of data that is steganographically hidden inside an image?

9. If you are a disloyal, disgruntled employee and want to steal data from your organisation, then which technique would you use?

10. What is Dumpster Diving? Why does an attacker usually carry it out?


1. What are routing tables? What are they used for?

2. Describe three different types of DOS attacks. How are they executed? Suggest some counter-measures.

3. Describe three different types of distributed DOS attacks. How are they executed? Suggest some countermeasures.

4. What is the key difference between DOS attacks and distributed DOS attacks?

5. Describe a hybrid DOS attack that has not been described in this course.

6. What security solutions would you implement in your organisation to prevent your employees from stealing data?

7. What is USB Hacking? What all can be done by an attacker using USB Hacking? How can you prevent USB Hacking?

8. What is an attacker usually trying to do while performing shoulder surfing?

9. What are Keyloggers? What makes them so dangerous?

10. How can an attacker prevent IP theft through cellphones?


1. You will need two different systems for this particular lab session. On one system install the victim part of the Trojan while on the other system install the attacker part of the Trojan. Now use the attacker part of the Trojan to control the victim part and do things on its screen. (Kindly submit actual screenshots as your answer.)

2. Carry out Dumpster Diving on a particular victim for a consecutive period of 10 days and collect all private, confidential information that you can about the victim. Please note that every student is required to take prior permission from the victim before carrying out this exercise. (Kindly submit actual items that you collect via Dumpster Diving as your answer.)

Quick Find
Use keywords to find the product you are looking for.
Advanced Search
1 x IMT-15: Production & Operation Management-MT3
1 x IMT-15: Production & Operation Management-MT1
1 x IMT-20: Managerial Economics-MT1
1 x IMT-92: Network Security-MT1
1 x IMT-57: Financial Accounting-MT1
1 x IMT-01: Management Process and Organization-MT2
1 x IMT-60: Training & Development-MT2
1 x IMT-07: Working Capital Management-MT3
1 x IMT-75: Brand Management-MT1
1 x IMT-10: Business Communication-MT2
1 x IMT-00: Computer in Management CAM-MT1
1 x IMT-70: Marketing of Service Industries-MT2
1 x IMT-81: Retail Management-MT1
1 x IMT-40: Marketing Management-MT2
1 x IMT-63: Group Dynamics & Managing Change-MT1
1 x IMT-30: Sales and distribution management-MT1
1 x IMT-24: Quantitative Techniques-MT2
1 x IMT-11: Managing People-MT1
1 x IMT-41: Indian Financial Service-MT1
1 x IMT-54: Business Law-MT2
1 x IMT-70: Marketing of Service Industries-MT1
1 x IMT-20: Managerial Economics-MT3
1 x IMT-74: Managing Human Resource in Global Environment-MT1
1 x IMT-51: Manufacturing Strategy-MT2
1 x IMT-16: International Trade-MT1
1 x IMT-58: Management Accounting-MT1
1 x IMT-87: Risk Management-MT1
1 x IMT-14: Organizational Structure & Behaviour-MT3
1 x IMT-93: Different Types of Attacks-MT1
1 x IMT-12: Human Resource Management-MT2
1 x IMT-13: Management Union Relations-MT2
1 x IMT-76: Industrial Marketing-MT1
1 x IMT-03: Marketing Research-MT2
1 x IMT-75: Brand Management-MT2
1 x IMT-12: Human Resource Management-MT1
1 x IMT-42: Capital Market and SEBI Regulations-MT1
1 x IMT-10: Business Communication-MT3
1 x IMT-57: Financial Accounting-MT2
1 x IMT-59: Financial Management-MT2
1 x IMT-17: International Marketing-MT1
1 x IMT-59: Financial Management-MT1
1 x IMT-55: Total Quality Management-MT2
1 x IMT-101: Networking and Telecom Management-MT1
1 x IMT-72: Rural Marketing-MT1
1 x IMT-82: Retail Shopper's Behaviour-MT2
1 x IMT-135: Marketing Management-I-MT1
Share Product

osCommerce Online Merchant Copyright © 2010 osCommerce
osCommerce provides no warranty and is redistributable under the GNU General Public License
Note: We provide all Solutions and Contents for Reference/Study purpose only.