Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assignment Pick your poison! Write a 550- to 750-word paper describing a situation in which one of the cyber-attacks(below) would cause a serious problem for an organization. Describe the...

1 answer below »

Assignment
Pick your poison!
Write a 550- to 750-word paper describing a situation in which one of the cyber-attacks(below) would cause a serious problem for an organization. Describe the countermeasures for preventing the attack, detecting the attack, or recovering from the attack. This assignment should bethree to fourpages in length (550 words minimum), usingAPA style.

Category Points % Description
Documentation & Formatting 5 10 Formatted using APA Style
Organizationand Cohesiveness 10 20 Follows logically and is written as recommendations for further study or implementation
Editing 10 20 Free of grammatical and spelling errors
Content 20 50 Written to clearly explain the topic, the issue or problem statement, the analysis, and recommendations for management action
Total 50 100 A quality paper will meet or exceed all of the above requirements.

See attack below
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)
In a denial-of-service (DoS) attack, the attacker sends a large number of connection or information requests to a target (see Figure XXXXXXXXXXSo many requests are made that the target system becomes overloaded and cannot respond to legitimate requests for service. The system may crash or simply become unable to perform ordinary functions. A distributed denial-of-service (DDoS) is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. Most DDoS attacks are preceded by a preparation phase in which many systems, perhaps thousands, are compromised. The compromised machines are turned into zombies, machines that are directed remotely (usually by a transmitted command) by the attacker to participate in the attack. DDoS attacks are the most difficult to defend against, and there are presently no controls that any single organization can apply. There are, however, some cooperative efforts to enable DDoS defenses among groups of service providers; among them is the Consensus Roadmap for Defeating Distributed Denial of Service Attacks.35 To use a popular metaphor, DDoS is considered a weapon of mass destruction on the Internet.36 The MyDoom worm attack of early 2004 was intended to be a DDoS attack against www.sco.com (the Web site of a vendor of a UNIX operating system) that lasted from February 1, 2004 until February 12, 2004. Allegedly, the attack was payback for the SCO Group’s perceived hostility toward the open-source Linux community.37
Any system connected to the Internet and providing TCP-based network services (such as a Web server, FTP server, or mail server) is vulnerable to DoS attacks. DoS attacks can also be launched against routers or other network server systems if these hosts enable (or turn on) other TCP services (e.g., echo).

Answered Same Day Dec 22, 2021

Solution

Robert answered on Dec 22 2021
121 Votes
Denial of Service
RUNNING HEAD: DENIAL OF SERVICE
Denial of Service


Ravi Gandhi
[Pick the date]
DENIAL OF SERVICE 1
Organizations are very much vulnerable to Cyber-attacks these days. Cyber - attacks are
nothing but the threat to the organizations or individuals with the internet as the acting medium.
The organizations and the individuals are targeted via the internet and their digital details are
hacked. In these attacks, the data of the target party can either be moved to some other location
or can be damaged completely from the root. One such attack is the Denial of Service. Denial of
service attack is the way of paralyzing the target organization’s computer processing by sending
a large number of requests to those computers. The target organization’s computer gets flooded
with the incoming requests and finally becomes overloaded.
With the system getting overloaded, the system becomes unable to respond to the genuine
equests that come to their ports. Originally the meaning of the denial of service is to block the
machines or the resources present in the network to reach to its co
esponding genuine
equesters. Suppose, the FBI or any Counter Te
orist Organization wants to communicate with
its sister concerns and the data among them is shared through the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here