-
Notifications
You must be signed in to change notification settings - Fork 0
/
S1.html
63 lines (58 loc) · 3.49 KB
/
S1.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
<html lang="en"><head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="icon" type="icon" href="img/cycm.png">
<link href="https://cdn.jsdelivr.net/npm/[email protected]/dist/css/bootstrap.min.css" rel="stylesheet" integrity="sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC" crossorigin="anonymous">
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.1.2/css/all.min.css" integrity="sha512-1sCRPdkRXhBV2PBLUdRb4tMg1w2YPf37qatUFeS7zlBy7jJI8Lf4VHwWfZZfpXtYSLy85pkm9GaYVYMfw5BC1A==" crossorigin="anonymous" referrerpolicy="no-referrer">
<link rel="stylesheet" type="text/css" href="css/style.css">
<link rel="preconnect" href="https://fonts.googleapis.com">
<link rel="preconnect" href="https://fonts.gstatic.com" crossorigin="">
<link href="https://fonts.googleapis.com/css2?family=Alex+Brush&family=Baloo+Tammudu+2&family=Open+Sans&family=Orbitron&family=Roboto:wght@300&display=swap" rel="stylesheet">
<title>CyberCrime Help Desk | GCESC CLASS 7 BOYS</title>
</head>
<body class="font-fav">
<style type="text/css">
.body{
padding: 0 100px;
margin-top: 100px;
text-align: center;
}
.body h1{
color: red;
}
.body h2{
color: green;
}
</style>
<div class="parent">
<div id="navbar">
<a class="active" href="index.html">Introduction</a>
<a href="qna.html">Back</a>
<a href="extra.html">Extra Problems?</a>
</div>
<div class="body">
<h1>Code: S1- Spoofing</h1>
<h2>Solution and precaution to these:</h2>
<p>• Use strong authentication: SPOOFING attacks often rely on weak authentication mechanisms to gain access to systems. By using strong authentication methods, such as multi-factor authentication, you can make it much more difficult for attackers to successfully spoof your identity.<br>
• Use IP filtering: IP filtering allows you to block specific IP addresses from accessing your system. This can be a useful way to prevent known attackers from launching SPOOFING attacks against you.<br>
• Use intrusion detection systems (IDS): IDS systems can monitor your network traffic for suspicious activity, such as large numbers of packets coming from a single IP address or packets with forged source addresses. If an IDS detects suspicious activity, it can alert you or block the traffic automatically.<br>
• Use intrusion prevention systems (IPS): IPS systems are similar to IDS systems, but they can also take action to prevent suspicious activity from happening. For example, an IPS could block packets from a known attacker or drop packets with forged source addresses.<br>
• Keep your software up to date: Software developers often release security patches to fix vulnerabilities that could be exploited by SPOOFING attackers. By keeping your software up to date, you can help to protect yourself from these attacks.
</p>
</div>
<footer>
<p>Product Owner: Ghatail Cantonment English School And College, Class 7 Boys<br>
"Copyright©"</p>
</footer>
</body><script>
window.onscroll = function() {myFunction()};
var navbar = document.getElementById("navbar");
var sticky = navbar.offsetTop;
function myFunction() {
if (window.pageYOffset >= sticky) {
navbar.classList.add("sticky")
} else {
navbar.classList.remove("sticky");
}
}
</script></html>