Preview

Competency 426 Executive Summary

Satisfactory Essays
Open Document
Open Document
508 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Competency 426 Executive Summary
LOT2 Task 1
Competency 426.4.4: Denial of Servive (DoS)

William J. Lawson

MS Information Security & Assurance - 5/1/13
Student ID:000311942
My Mentor: Mary Gordon c: 317-448-3045
Indianapolis, IN - Eastern Time wlawson@my.wgu.edu B. Recommend in an executive summary measures to counter this type of DoS Attack.
Executive Summary The university network was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator access. We suspect that the attacker gained access to the network from an internal computer, most likely from a student PC in one of the labs. The attacker likely used keylogger software to discover administrator credentials. Once the attacker had the administrator access the systems he/she was able to create BOTs and push to many student PCs located in various labs. The attacker then initiate a control attack by activating the BOT 's in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unusable to students (ICECC, 2009).
…show more content…
It was the combined effect of using many BOTs at once that produced the attacker 's desired effect of overflowing the resources of the registration web server and rendering it unusable.
Recommendation to Counter this type of DoS attack
To prevent or limit the impact of keyloggers:
Deploy a firewall to block known keylogger software.
Educate facility not to open email from unknown users and not to click on links in emails from unknown users.
Create a Policy whereby users cannot install new software to a machine without opening a ticket with the helpdesk or requesting administrator access (ICECC, 2009). The student computers should be preloaded with all required

You May Also Find These Documents Helpful

  • Satisfactory Essays

    My teaching practice helps meet this statement on having a positive, responsive, cooperative relationship with each child’s family by knowing each family members and greeting them by name. I am able to invite families to take part in program activities. I am able to help families understand the importance of play for children. I am also able to empathize with families around stressful areas of parenting, such as lack of sleep, illness, challenging behaviors and I am able to provide support and suggestions when needed or asked.…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lot2 Task 1

    • 719 Words
    • 3 Pages

    The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets:…

    • 719 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    In 2004, 18 year old Jason Salah Arabo from Michigan was arrested and pleaded guilty with conspiracy to order destructive computer attacks on business competitor’s websites from his home by remotely controlling them with a computer program called, “Bot”. Bots can be easily disguised as MP3 music files or pictures that unaware users download from public websites. Once they are downloaded, Bots will cause the virus to overload the website’s hosting computer server that result in crashing the entire system. Arabo wasn’t alone in this process. He and former 16 year old “Jasmine” Signh from New Jersey, creator of the Bot, had met Arabo on an instant messenger chat, and had agreed to help takedown Arabo’s competitor websites in exchange for Arabo’s merchandise, including designer sneakers. Arabo was running two business companies that sold throwback sports apparel such as team jerseys over the internet. Together, Arabo and Signh had designed the program in what they thought would help Arabo’s business by stopping customers from visiting and using other services.…

    • 459 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Competency Statement 1

    • 312 Words
    • 2 Pages

    The goals in my classroom are to achieve the objective of safety by providing the children with safe environment and equipped children to explore without any injuries. Another goal is to promote healthy habits. Another one is to promote a good age appropriate learning environment.…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    After a thorough investigation by federal law enforcement it had been determined that hackers were able to infiltrate the network and place malware on several pieces of the companies Point of Sale (POS) systems. The attackers were meticulous and thought through their attack, attempting to…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Lab8 1 Some Common Risks

    • 505 Words
    • 3 Pages

    • An unauthorized user eavesdrops on remote access communications and manipulate them using a compromised server (Scarfone, Hoffman, & Souppaya, 2009)…

    • 505 Words
    • 3 Pages
    Good Essays
  • Good Essays

    student

    • 795 Words
    • 3 Pages

    Remote access Domain: infected people connecting to the network can affect to whole network or someone giving other people connectivity without the right credentials.…

    • 795 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    case study

    • 620 Words
    • 3 Pages

    a. Overall, I believe this attack falls into four major threat categories: deliberate acts of trespass, compromises to intellectual property, technical failures, and managerial failure. Furthermore, I believe this attack would be categorized as a deliberate act of theft/trespass which compromises intellectual property due to technical and managerial failures. b. It seems as this hacker was deliberately causing harm (i.e. copying files, vandalizing the web page, and theft of credit card numbers); due to their method of entry – hacking into a network – it leaves me to believe there were some…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Wired and Wireless

    • 4256 Words
    • 18 Pages

    As technology advances in society the need for wired and wireless networking has become essential. Each of these types of networking has their advantages and disadvantages according to security. Wired networking has different hardware requirements and the range and benefits are different. Wireless networking takes into consideration the range, mobility, and the several types of hardware components needed to establish a wireless network. As you read on you will understand different types of configurations of networks and the security measures that need to be taken to ensure a secure network.…

    • 4256 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    DoS DDoS

    • 1875 Words
    • 11 Pages

    2- In most respects it is similar to a DoS attack but the results are much, much…

    • 1875 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Cp102

    • 362 Words
    • 2 Pages

    * Don’t have to wait for the whole cycle to finish, can start multiple commands…

    • 362 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cause Network

    • 571 Words
    • 3 Pages

    Hacking and the study of computer insecurity play an important role in the protection of assets. No computer system or network achieves perfect security; even a system switched off with its hard drive removed sunken in a lead case in the bottom of a deep pool in an underground facility lacks security, as it guarantees integrity and confidentiality but completely sacrifices availability. As a security professional, you must understand the risks a network faces; you must, in essence, know how to bring the network down, to steal the data you want, and to falsify important information. With this information, you can begin to eliminate threats, leaving only those unknown to you and those that pose little to no real risk.…

    • 571 Words
    • 3 Pages
    Good Essays

Related Topics