Assignment 1 - CSU1899 - Shoolini U

FL2: Terminologies, Tools, and Software

1. Methods and Tools Used in Wireless Hacking

Wireless hacking involves exploiting vulnerabilities in wireless networks to gain unauthorized access or information. Ethical hackers use these techniques to identify and fix flaws in wireless security systems.

Common Techniques

Ethical Considerations

Defensive Measures

2. Difference Between Firewall and Honeypot

Firewalls and honeypots are vital tools in cybersecurity but serve different purposes.

Firewall

Honeypot

Examples of Deployment

3. Role of IDS and IPS in Network Security

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) work together to detect and prevent cyber threats.

IDS

IPS

Comparison

Working Together

4. Session Hijacking

Session hijacking occurs when attackers gain unauthorized control of a user’s session in a web application.

Methods of Exploitation

Security Risks

Countermeasures

5. Differences Between SQL Injection, XSS, and Buffer Overflow Attacks

These are common vulnerabilities in web applications.

SQL Injection

Cross-Site Scripting (XSS)

Buffer Overflow