vu it430 Mid Term Subjective Solved Past Paper No.8
vu it430 E-Commerce Solved Past Papers
This subjective solved past paper is related to book/course code vu it430 E-Commerce which belongs to vu organization. We have 8 past papers available related to the book/course E-Commerce. This past paper has a total of 10 subjective questions belongs to topic Mid Term to get prepared. NVAEducation wants its users to help them learn in an easy way. For that purpose, you are free to get prepared for exams by learning subjective questions online on NVAEducatio.
NVAEducation also facilitates users to download these solved past papers with an affordable prices. However, users are not enforced to pay for money, rather they can use credits to buy such stuff on NVAEducation. Users can earn credits for doing some little tasks and then you will be able to use that credits to buy solved past papers on NVAEducation.
- Outside attacks
- Password attacks
- IP address spoofing
- Man in the middle attacks
- Eavesdropping/ sniffing/snooping
- Denial of services (DOS) attacks
DOS
In this type of attack, the attacker gains access to the network and then send invalid data to network services or applications. These services or applications consequently become unable to perform their normal tasks or functions. Hence, sending a flood of data to a particular service or computer can cause it to overload or shutdown. This attack is specially used to take down websites on the internet, when repeated requests for web pages are deliberately initiated so as to choke down a web server.
Eavesdropping/ sniffing/snooping In this type of attack the hacker has the ability to monitor network traffic using some kind of network monitoring software. For example, a hacker may install some backdoor or Trojan horse that can monitor the key strokes of a user while typing and send the typed information to the hacker.
Password attacks Such attacks are basically a result of eavesdropping through which the hacker is able to know the account ID or password of a particular user. Then using it the hacker gains access to the network and gather information such as user names, passwords, computer names, resources etc. That can lead to modification, deletion or rerouting of network data.
IP address spoofing You know that there are two IP addresses available on a data packet - IP addresses of the sender and the destination. The address of the destination only matters for routing. It is possible that a hacker (having special capabilities) seizes the control of a router, changes the IP address of the source/sender on data packets and thus forces the destination machine to send the information/web page to a different machine, that is, the machine of the hacker. This is called IP address spoofing.
Man in the middle attacks In it the attacker is able to monitor, capture and control data between sending and receiving machines. He may apply IP address spoofing technique to divert the packets to its machine, then modify the packets and resend the misleading information to the actual client. Another form of man-in-the-middle attack is where the hacker is able to substitute the IP address of a genuine web site with the IP address of his own web site due to some security hole in the software that runs on a domain name server. A client would think that he is communicating or receiving the information form a genuine web site, though it would not be the case actually.
Denial of services (DOS) attacks In this type of attack, the attacker gains access to the network and then send invalid data to network services or applications. These services or applications consequently become unable to perform their normal tasks or functions. Hence, sending a flood of data to a particular service or computer can cause it to overload or shutdown. This attack is specially used to take down websites on the internet, when repeated requests for web pages are deliberately initiated so as to choke down a web server.
Example code
<HTML>
<HEAD>
</HEAD>
<BODY> <H1>this is my main title</H1>
<p>here is the first paragraph. This is some <b> <i>bold text</i> </b> </p>
<p> <font face="Arial"> this text is in the Arial font. </font>
</BODY>
</HTML>
A common classification of EC is by the nature of transaction:
Business-to-Business (B2B):
Electronic market transactions that take place between organizations
Business-to-Consumer (B2C):
retailing transactions with individual shoppers - typical shopper at Amazon.com is a consumer
Consumer-to-Consumer (C2C):
consumer sells directly to consumers, examples -individuals selling in classified ads, auction sites allowing individuals to put up items for auction - e.g, e-bay
Consumer-to-Business (C2B):
individuals who sell products or services to organizations and those who seek sellers and conclude a transaction
Intra Business (organizational) EC:
all internal organizational activities involving exchange of goods, services or information, selling corporate products to employees, online training and cost reduction activities
Non-Business EC
- academic institutions, not-for-profit organizations, religious/social organizations and government agencies using EC to improve their operations, customer service and reduce expense
A certification authority is defined to be a trusted public/private body that attests the association of a particular individual with his/her corresponding public key. A CA signs digital certificates with its private key. There are many CAs working in the field but the pioneering or the most reputed CA is Verisign which is based in America.
Certification authorities work in a hierarchical fashion. There is the CA at the top called root CA (the most reputed CA). It can issue certificates to CAs working below it and those CAs' can further issue certificates to CAs working under them. In this fashion a hierarchy of CAs is developed with each CA confirming the public key of the CA below it through a digital certificate.
- Microsoft Windows NT Server
- Microsoft Windows 2000 Advanced Server
- Microsoft.NET Server
- Linux or Unix based operating systems such as Solaris