Answer:
Risk assessment, Input validation and Output validation.
Explanation:
Software development life cycle, SDLC, is a systematic process a software being created must pass through or follow, from the stage of conception to death of the application.
There are various processes that occurs at the beginning of SDLC, a few of the activities are risk management, input and output validation.
Risk management is used to determine the feasibility, usefulness and profitability to cost of the software before development. The input and output validation is for security control access to the data of the software.
Cell is the term used to describe a singular container in an Excel.
<h3>What is a single box in a spreadsheet?</h3>
An active cell as seen in an Excel worksheet, is one which is made up of small rectangle or box called cell.
Note that the active cell is one that has the selected cell and it is where the data is entered if a person begin typing.
Hence, Cell is the term used to describe a singular container in an Excel.
Learn more about spreadsheet from
brainly.com/question/4965119
#SPJ1
Answer:
a) Open the DNS settings on your router and try using a different DNS.
Explanation:
The DNS or domain name service is a protocol that majorly assigns a URL string to an IP address. This is because the IP address as a number is easily forgotten.
In the question above, the operator could not access the websites with the URL name but can confirm connectivity to the site with its IP address. This means that the IP address can be used to access the websites directly, so, the DNS protocol is either not configured or is down.
Answer:
DNS poisoning or DNS cache poisoning
Explanation:
- It is also called spoofing.
- It is a type of cyber attack in which the Domain Name System server data is modified.
- This modified and corrupted data is entered in DNS cache as a result of this, the internet traffic is redirected to some fake and fraud servers. These fake servers is controlled by the attacker.
- DNS basically coverts the domain names to IP addresses. Domain name (such as iamthebest.com) is understandable by humans so DNS translates it to IP address which is readable by computer.
- So when the computer gets a domain name, as domain name is readable by humans, so a computer will reach a DNS server to request the translation.
- The DNS server responds to this request by providing the IP address where the computer can locate that domain name.
- So the DNS server has a cache which stores the frequently requested translations so that it does not have to look up to other servers every time for the same request.
- If an incorrect translation has been entered into the DNS cache, it is said to be poisoned.
- Lets say some attacker modifies or corrupts some data in the DNS server as a result of which the web server directs the user to the wrong IP address of the attacker which might contain a malicious website.
- As the Internet Service Provider caches data from other DNS servers so the DNS poisoning can spread as the affected DNS server's information can be cached to other ISPs as they keep on storing false translations.
- As a result of DNS poisoning the users are diverted from the target website to a website that belongs to an attacker and contain viruses or a phishing website which can take personal information from the user such as credit card information.