Originality of attachments will be
verified by Turnitin, for Free Plagiarism Check
1-What is a buffer overflow and how is it used against a web
2-For a sniffer attack to succeed, what must the attacker
do? How can an attacker gain access to a network to use the sniffer system?
3-What are the types of password attacks? What can a system
administrator do to protect against them?
4-why is information security a management problem? What can
management do that technology cannot?
5-Why is data the most important asset and organization possess?
What other assets in an organization require protection?
6-Why do employees constitute one of the greatest threats to
7-What measures can individuals take to protect against
8-How has the perception of the hacker changed over recent
years? What is the profile of the hacker today?
9-What is the difference between a skilled hacker and an
unskilled hacker (other than skill levels)? how does the protection against
10-What are the various types of malware? How do worms
differ from viruses? Do Trojan horses carry viruses or worms?