Question

research one attack of application layer of tcp/IP model.answer the following questions for the attack. 1....

research one attack of application layer of tcp/IP model.answer the following questions for the attack.
1. what was the attack
2. how is attack carried out
3. what does attack hope to achieve
4. Relate to CIA train
What network vulnerabilities does the attack take advantage of.
5. What can be done to mitigate the attack
please attach the URL of the references

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. SQL injection attack

2. user give input in the form that will affect the backend database adversely.

3. attack wants to disturb the data stored in the database or completely delete the data.

4. confidentiality, integrity,availability all are affected as the user get the access of data and changes it which he/she otherwise is not allowed to do so.

5. to mitigate the attack , use quotename() function to check the user input given ;before that affects the database.

Add a comment
Know the answer?
Add Answer to:
research one attack of application layer of tcp/IP model.answer the following questions for the attack. 1....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and...

    Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....

  • 1.In the TCP/IP protocol suite, the ______ layer is responsible for moving frames from one hop...

    1.In the TCP/IP protocol suite, the ______ layer is responsible for moving frames from one hop (node) to the next.Immersive Reader (10 Points) network data link transport physical 2.As frequency increases, the period ________.Immersive Reader (10 Points) increases none of the choices are correct decreases remains the same 3.Data can flow only in both direction all of the times in a _________ mode.Immersive Reader (10 Points) none of the choices are correct half-duplex simplex full-duplex 4.For a ______ channel, the...

  • QUESTION 8 Which layer of the TCP/IP hierarchy presents incoming messages to the computer user? a....

    QUESTION 8 Which layer of the TCP/IP hierarchy presents incoming messages to the computer user? a. Network b. Link c. Transport d. Application 2.5 points    QUESTION 9 A relational database is a collection of one or more tables that are related by key values. True False 2.5 points    QUESTION 10 Which standards organization produced the OSI reference model for internet communication? a. IEEE b. ISO c. ANSI 2.5 points    QUESTION 11 Which of the following is used...

  • Answer the following questions with citing references :- 1. What are the 3 private IP address...

    Answer the following questions with citing references :- 1. What are the 3 private IP address ranges for IPv4? How many usable IP addresses does each range have? 2. What is the purpose of private IP addresses (sometimes incorrectly called non-routable IP addresses)? How are they used? 3. What are the components of MAC addresses? How are MAC addresses assigned? 4. What is a layer 3 / multilayer ethernet switch? How does it differ from a traditional switch? Why does...

  • can you answer these questions 1)Which of the following is an alternative for implementing packet switching?...

    can you answer these questions 1)Which of the following is an alternative for implementing packet switching?        a. Frequency-Division Multiplexing        b. CDMA        c. Time-Division Multiplexing        d. None 2)What layer of the TCP/IP protocol model determines the best path through the network?        a. Application        b. Transport        c. Session        d. Internet        e. Network Access 3) RIP can work but OSPF cannot work in which of...

  • Description: In this assignment, you will be launching a denial of service attack on a web...

    Description: In this assignment, you will be launching a denial of service attack on a web server. We will be using hping3, a command-line oriented network security tool inside Kali Linux (an advanced penetration testing Linux distribution). Setting up the victim machine Download the Windows XP virtual machine with WebGoat server installed, using the following link. We will use this machine as the victim machine and launch a DoS attack on the WebGoat server.https://drive.google.com/open?id=0BwCbaZv8DevUejBPWlNHREFVc2s Open the victim machine and launch...

  • In this assignment, you design a simple chat room in the form of a network application which uses the services of a TCP/IP computer network. Your design should have a clientserver architecture in whic...

    In this assignment, you design a simple chat room in the form of a network application which uses the services of a TCP/IP computer network. Your design should have a clientserver architecture in which the server is multi-threaded. Then, you need to implement the server-side of the chat-room application in Java (implementing the client-side is optional). The server maintains a list (an ArrayList will work well) of all the active connections. It will listen on a port for a new...

  • These questions relate to grants and grant proposals Why should you not mention that a study...

    These questions relate to grants and grant proposals Why should you not mention that a study will be carried out “because it has never been done” or “there are no data on”? What is the point of including headings, sub-headings, and figures? Why should you tie hypotheses in with long-term objectives? What is the difference between Specific Aims and Background and Significance? What three questions should be addressed in the Background and Signicance section? How does Progress relate to Background...

  • Cyber Security EXERCISE 1: One very simple tool to figure out if a “host” (any device...

    Cyber Security EXERCISE 1: One very simple tool to figure out if a “host” (any device with an address on a network) is turned on and communicating over the network is “PING.” Of course, system administrators can prevent hosts from responding to pings. DO: Check out the website: In Kali, open up the browser (Iceweasel). In the address bar type the URL http://www.foo.com to notice that there is a site configured with that domain. Open up the command line on...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT