CSCI 4174 NETWORK SECURITY-Assignment 2


  • 作业标题:CSCI 4174/CSCI 6708 NETWORK SECURITY: ASSIGNMENT NO. 2
  • 课程名称:Dalhouse University CSCI 4174 Network Security
  • 完成周期:2天

练习1

Exercise 1 (Exploratory): In the lectures we discussed the importance of ethical hacking, that is, the moral
principles that guide ethical hackers. The lecture notes also list several resources on ethical hacking. Read these and other online resources on this subject. In your own words and from your own perspective, make a list of 7 principles (we like listings in seven, don’t we, remember the seven security goals !) that you consider as important in ethical hacking. For each principle, write a short description. Cite your references at the end of the list.

。。。

练习2

Exercise 2 (Experimental): In this exercise, you will be using the hping3 utility on Kali Linux to simulate Denial of Service (DoS) attacks using some of the techniques that we discussed in the lectures.

Important note: You will be launching the DoS attack inside your own laptop/desktop by creating virtual
machines. Further, you will be launching the attack on a loopback address 127.0.0.1. A packet with a loopback address never leaves your machine

。。。

提交要求

Submission: Upload your answer document as ONE PDF file containing your answers to Exercise 1 and Exercise 2 (Experiments No. 1 and 2). Make sure that you have your name and ID on the document.


文章作者: IT神助攻
版权声明: 本博客所有文章除特別声明外,均采用 CC BY 4.0 许可协议。转载请注明来源 IT神助攻 !
  目录