Preview

CyberSecurity

Good Essays
Open Document
Open Document
754 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CyberSecurity
Cybersecurity
DDoSDDoS means Distributed Denial of Service and what that means is that it spams a target with so many request to the point that the target is really slow and inoperable or crashes.
DDoS works by a cracker sending the command to initiate the attack to his zombie army. Each computer within the army sends an electronic connection request to an innocent computer called a reflector. When the reflector receives the request, it looks like it originates not from the zombies, but from the ultimate victim of the attack. The reflectors send information to the victim system, and eventually the system's performance suffers or it shuts down completely as it is inundated with multiple unsolicited responses from several computers at once. From the perspective of the victim, it looks like the reflectors attacked the system. From the perspective of the reflectors, it seems like the victimized system requested the packets. The zombie computers remain hidden, and even more out of sight is the cracker himself.

DDoSDistributed Denial of Service Attack (DDoS) is A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.
In this article the DDos attack tried to prevent people from making an unofficial vote on who Hong Kong wanted as a preferred political representative.
Cloudflare helped prevent the attack by tipping the traffic into sinkholes (DNS sinkhole) the DNS kept sending the data to a dead end so the attack could never hit cloudflare or popvote.hk
Phishing
Phishing is a technique used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses.
Virus
A segment of self-replicating code planted illegally in a computer program, often to damage or shutdown a system or network.
Worm
A program or algorithm that replicates

You May Also Find These Documents Helpful

  • Satisfactory Essays

    There are multiple versions of spoofing but this is when the hacker inputs a false header on the packet so it will trick the receiving network that the packet is from a legitimate source. This could send in harmful packets that could damage the network and allow hackers to gain access to the network.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Once the attacker had the administrator access the systems he/she was able to create BOTs and push to many student PCs located in various labs. The attacker then initiate a control attack by activating the BOT 's in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unusable to students (ICECC, 2009).…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The complete protection of the campus infrastructure from a (D)DoS is futile however, there are measures that can be put into place which will significantly reduce the risk of an outage due to a (D)DoS. Standardizing policies and procedures, segmenting the network into functional areas, active monitoring, and a defense in depth approach will reduce the duration and severity of any future (D)DoS attack.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    Denial-of-service DoS attacks DoS attack is simply to send more traffic to a network address than the programmers who planned its data buffers anticipated someone might send. The attacker may be aware that the target system has a weakness that can be exploited or the attacker may simply try the attack in case it might work. According to AppliCure Technologies preventing Denial of Service Attack With dotDefender web application firewall you can avoid DoS attacks because dotDefender inspects your HTTP traffic and checks their packets against rules such as to allow or deny protocols, ports, or IP addresses to stop web applications from being exploited…

    • 577 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Denial of services is an attack on networks that are intended at making computer or particular service on a computer unavailable.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Class this concept of overloading the system can, however, be used by nefarious individuals to deny service to companies. Has anyone ever experienced a denial of service attack? Have you ever heard of Botnets?…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    4. Tiny pieces of programming code that install themselves on an infected computer called a Zombie and transmit data back to the hackers’ computer without awareness of the Zombie computer user…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    As the organization’s IT security professional, you have been asked by your organization’s CIO and CEO to suggest steps and techniques that would mitigate risks associated with VoIP and SIP applications at the same time, maintaining the controls provided via C-I-A model.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Individual Assignment 1

    • 2342 Words
    • 10 Pages

    Kuppusamy, K. K., & Malathi, S. S. (2012). Prevention of Attacks under DDoS Using Target Customer Behavior. International Journal Of Computer Science Issues (IJCSI), 9(5), 301-307.…

    • 2342 Words
    • 10 Pages
    Best Essays
  • Good Essays

    One must wonder if the "war on drugs" helps or hinders our American Criminal Justice System when you look at the overwhelming impact it has had on crowding issues within our prisons. At the present time there are over 1.5 million people in prison, 59.6 % for drug offenses alone.…

    • 1178 Words
    • 5 Pages
    Good Essays
  • Better Essays

    NTP-based DDoS attack has grown from 2013, and publicly spread out in January 2014 by CloudFlare, a website security company (Graham-Cumming, 2014). According to them, they have succeeded on mitigating a 400 Gbps NTP-based DDoS attack against one of their customer’s website (Prince, 2014). This indicate NTP-based DDoS attack can be very powerful since most powerful DDoS attack previously recorded is around 300 Gbps (Constantin, 2013). The source of attack came from multiple network with unsecured NTP servers, which abused by the attacker. Most of the network that contribute on the attack came from China, followed by Europe and Asia (CloudFlare, 2014).…

    • 1480 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The Dawn of The net

    • 399 Words
    • 1 Page

    The dawn of the net is a more or less 20 minutes show that illustrates the process or the sequence involving the internet. As I watched the show, I was really amazed how the internet works, how the message was being send and what the computer usually do whenever there are unacceptable websites. The show usually more on what is inside the computer. Through this, I was able to know the warriors of the net and they are the TCP packet or known as Transfer Control Protocol, the ICMP or Internet Control Message Protocol, the UDP, Router, Ping of death, and Router Switch. The Transfer Control Protocol looks like the bus where the information is being packed. The Router is programmable memory. The router's switch on the other hand is more specific of the destination of the packet. The Ping of death in the computer refers to the police that captures the hacker and destroys the unacceptable sites. The process involving is a little bit long.Whenever the user types something in the website, the information is packed and it is already called as the TCP packet. the TCP packet is the labeled and the address is being placed and it will be send to the Router. The Router sends the TCP packet into the Router Switch which guides it to the network interface and it will be received by the proxy or sometimes referred to as the mailman. It is then that the TCP packet is being opened and its contents are checked. If the contents of the TCP packet consist of sites that are unacceptable just like pornographic sites it is destroyed. After this, the firewall will chose what TCP packets can come inside. There would be few that will be remained to enter the spider web. After the spider web, it will be received again by the firewall wherein the TCP packet is then categorized into 80 or 25. The packet would be destroyed if it does not fall into either 80 or 25. After this it will go to the proxy server where it would be open and unpacked. And lastly, the information is being send back to you. It…

    • 399 Words
    • 1 Page
    Good Essays