Ask
Search
Ask Question
Login
×
×
Welcome back.
and 4 others joined a min ago.
Continue with Google
Continue with email
Read
Write
Sort by: updates
updates
views
bookmarks
followers
votes
answers
3
votes
1
answer
23k
views
1
answer
Compare packet sniffing and packet spoofing. Explain session hijacking attack.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
1
vote
1
answer
3.1k
views
1
answer
What are the various types of IP spoofing?
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
1
vote
1
answer
3.4k
views
1
answer
Explain methods used to commit session hijack. What is SQL injection? Give example.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
2
votes
1
answer
5.0k
views
1
answer
Explain different methods to commit a session hijack and methods to prevent session hijacking.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
4
votes
1
answer
39k
views
1
answer
What are the different types of vulnerability, threat and control? Give examples of each.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
1
vote
1
answer
6.7k
views
1
answer
Short Note on SSL/TLS
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
1
vote
1
answer
16k
views
1
answer
Why Secure Socket Layer (SSL) is needed? What are the different features SSL provides? Explain how SSL works?
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
1
vote
1
answer
14k
views
1
answer
Discuss Intruders, viruses and worms in detail. Also explain logical bomb and Trojan horse given the difference between viruses and worms.
data compression and encryption
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
6.3k
views
1
answer
Write in brief about Buffer overflow attack.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
5
votes
1
answer
25k
views
1
answer
Various ways of memory and address protection.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
3
votes
1
answer
59k
views
1
answer
What are firewall design principles?
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
3.2k
views
1
answer
Define : Cross site Scripting (XSS)
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
7.0k
views
1
answer
Define: Salami attack.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
3.4k
views
1
answer
Write in brief about Viruses and their types.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
4
votes
1
answer
7.2k
views
1
answer
Operating System Security
cryptography and system security
updated
6.1 years ago
by
parviagrawal100
•
0
4
votes
1
answer
22k
views
1
answer
Explain Non malicious programming errors
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
1.9k
views
1
answer
What is personal firewall?
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
8.8k
views
1
answer
List, explain and compare different kinds of firewall used for network security.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
3
votes
1
answer
33k
views
1
answer
Short note on Firewall.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
2
votes
1
answer
10k
views
1
answer
Explain different Targeted malicious code.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
12k
views
1
answer
What are the different types of malicious code?
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
2
votes
1
answer
9.0k
views
1
answer
Explain the significance of intrusion detection system for securing a network. Compare signature based and anomaly based IDS
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
0
votes
1
answer
8.2k
views
1
answer
What is access control? How does Bell-Lapadula model achieve access control.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
7
votes
1
answer
46k
views
1
answer
Compare Firewall and Intrusion Detection System (IDS)
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
2
votes
1
answer
8.8k
views
1
answer
Describe the different types of IDS and their limitations.
cryptography and system security
updated
6.1 years ago
by
teamques10
★
70k
<prev
• 28,287 results • page 683 of 1132 •
next >
×
Top contributors for
*** MISSING ***
×
Merge
*** MISSING ***
to
Community
Users
Levels
Badges
Content
All posts
Tags
Dashboard
Company
About
Team
Privacy
Submit question paper solutions and earn money