0
0
Computer Networksknowledge~30 mins

Why understanding attacks enables defense in Computer Networks - See It in Action

Choose your learning style9 modes available
Why Understanding Attacks Enables Defense
📖 Scenario: You are part of a small company's IT team. Your job is to help protect the company's computer network from bad people who try to break in and cause harm.To do this well, you need to understand the kinds of attacks these bad people use. This knowledge helps you build better defenses.
🎯 Goal: Build a simple list of common attack types, set a threshold for which attacks are most dangerous, filter the list to only include those dangerous attacks, and finally, add a note explaining why knowing these attacks helps protect the network.
📋 What You'll Learn
Create a list called attack_types with these exact strings: 'Phishing', 'Malware', 'DDoS', 'Man-in-the-Middle', 'SQL Injection'
Create a variable called danger_threshold and set it to 3
Create a dictionary called attack_danger_levels with these exact pairs: 'Phishing': 2, 'Malware': 4, 'DDoS': 5, 'Man-in-the-Middle': 3, 'SQL Injection': 4
Create a list called dangerous_attacks that includes only attacks from attack_types whose danger level in attack_danger_levels is greater than or equal to danger_threshold
Create a string variable called defense_note with the exact text: 'Understanding attacks helps build strong defenses.'
💡 Why This Matters
🌍 Real World
Knowing common cyber attacks helps IT teams protect networks by focusing on the most dangerous threats.
💼 Career
Cybersecurity professionals must understand attack methods to design effective defenses and keep systems safe.
Progress0 / 4 steps
1
Create the list of attack types
Create a list called attack_types with these exact strings: 'Phishing', 'Malware', 'DDoS', 'Man-in-the-Middle', 'SQL Injection'
Computer Networks
Need a hint?

Use square brackets [] to create a list and include all attack names as strings inside.

2
Set the danger threshold
Create a variable called danger_threshold and set it to the number 3
Computer Networks
Need a hint?

Just assign the number 3 to the variable named danger_threshold.

3
Create the attack danger levels dictionary
Create a dictionary called attack_danger_levels with these exact pairs: 'Phishing': 2, 'Malware': 4, 'DDoS': 5, 'Man-in-the-Middle': 3, 'SQL Injection': 4
Computer Networks
Need a hint?

Use curly braces {} to create a dictionary with attack names as keys and their danger levels as values.

4
Filter dangerous attacks and add defense note
Create a list called dangerous_attacks that includes only attacks from attack_types whose danger level in attack_danger_levels is greater than or equal to danger_threshold. Then create a string variable called defense_note with the exact text: 'Understanding attacks helps build strong defenses.'
Computer Networks
Need a hint?

Use a list comprehension to filter attacks. Then assign the exact text to defense_note.