Preview

Itp 1101 Research Paper

Powerful Essays
Open Document
Open Document
2125 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Itp 1101 Research Paper
ITP 1101 1I Research Paper
MARTIN PAOLO A. LAPORGA
RICHARD GRIFFITHS
12/13/12

This paper provides a general overview of denial-of-service attacks in which the primary goal of the attack is to remove or limit the victim’s access to a particular service or resource. The paper also provides an overview of on methods of attack and its impacts. It also includes information that may assist you on how to respond to such an attack.
DESCRIPTION

"Denial-of-service" attacks are commonly characterized by an explicit attempt by hackers to prevent legitimate users of a service or resource from using them. It is also an effort to make one or more computer systems unavailable. It is typically targeted at web servers, but it can also be used on mail servers, name servers, and any other type of computer system. Denial of service (DoS) attacks may be started from a single machine, but they typically use many computers to carry out an attack. Since most servers have firewalls and other security software installed, it is easy to lock out individual systems. Therefore, distributed denial of service (DDoS) attacks are often used to coordinate multiple systems in a simultaneous attack. A distributed denial of service attack tells all coordinated systems to send a continuous stream of requests to a specific server all at the same time. These requests may be a simple ping or a more complex series of packets. If the server cannot respond to the large number of simultaneous requests, incoming requests will eventually become queued. This backlog of requests may result in a slow response time or a no response at all. When the server is unable to respond to legitimate requests, the denial of service attack has succeeded.

Examples include: * attempts to "flood" a network, thereby preventing or slowing legitimate network traffic * attempts to disrupt o prevent connections between two machines, thereby disrupting or preventing access to a service * attempts to stop a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Network Attached Storage (NAS) is a type of file-level storage device which is dedicated and designed to provide users with fast and secure access to their data at all times over LAN and Ethernet connections. NAS’s are normally a specialized computer built to store and serve files quickly. The Capacity for NAS’s is limitless. Low end Network Attached Storage units start at around $300 and can store over 5 Terabytes. The Picture on the right is of a Netgear ReadyNAS 312 RN31200 and can hold 8TB.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Indeed, Santa Claus is coming to town. Only this time, he's a "Secret Santa" in the form of a casino online video slot game provided by Microgaming. It's hard to imagine there would be slot players who won't enjoy playing the Secret Santa slot, even if it's only during the holiday season. Since the jackpots and excitement exist year-round, it makes perfect sense this game should be considered a keeper 365 games a year.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The university network was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator access. We suspect that the attacker gained access to the network from an internal computer, most likely from a student PC in one of the labs. The attacker likely used keylogger software to discover administrator credentials.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    FP/120 Final Exam Paper

    • 430 Words
    • 2 Pages

    Question: From the following, which is a factor to consider when you are buying a car?…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network attached storage (NAS) is basically a server that acts as hard drive that’s attached to a network (Johnson). This connection to a network allows anyone who is also connected to the network the ability to access the hard drive. The NAS come in many sizes and different capabilities. The network connection that the NAS uses can be almost any that are available. The standard Ethernet connection is the most common connection by there are also systems that use a wireless connection or even a fiber optic connection for extremely fast transfer speeds.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    Defense in Depth provides the university several layers of protection. Starting at the endpoints, host intrusion protection (HIPS), should be installed on each Device. Properly installed, HIPS will not permit the installation of unauthorized programs. This was the root cause of the (D)DoS recently experienced. At the routers access control lists (ACLs) must be put in place to allow only traffic with a legitimate protocol and destination. Between the routers and the endpoint a firewall solution must be put in place. The firewall must be configured to allow only allowed protocols and port numbers to communicate with specific destinations. Between the firewall and endpoint a (D)DoS a detection tool (such as Arbor’s Prevail) must be put in place. This measure not only allows for quick detection of (D)DoS it also permits the automatic mitigation of the…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    Denial-of-service DoS attacks DoS attack is simply to send more traffic to a network address than the programmers who planned its data buffers anticipated someone might send. The attacker may be aware that the target system has a weakness that can be exploited or the attacker may simply try the attack in case it might work. According to AppliCure Technologies preventing Denial of Service Attack With dotDefender web application firewall you can avoid DoS attacks because dotDefender inspects your HTTP traffic and checks their packets against rules such as to allow or deny protocols, ports, or IP addresses to stop web applications from being exploited…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To understand the what the advantages of a declarative language as opposed to a procedural language, we must understand the difference between the two. A procedural language such as FORTRAN or Cabal (There are more) give precise instructions that tell the computer what to do. In other words a procedural language is your basic “if-this, then-that”. Specific variables are defined that tell the CPU how to process information. It takes a programmer that knows the intimate details of how the code works to ensure that programs work the way they are supposed to.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    ENC 1102 Research Paper

    • 261 Words
    • 1 Page

    The final draft will be submitted to SafeAssign and as a print copy to me on the last day of class, December 9.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Isys 100 Research Paper

    • 2116 Words
    • 9 Pages

    3) When you hear the term “making IT eco-friendly”, explain how this is related to Information Technology and the environment.…

    • 2116 Words
    • 9 Pages
    Good Essays
  • Good Essays

    IAH 201 paper 1

    • 1173 Words
    • 3 Pages

    At the time of the Spanish American War the United States went from relative isolation to increased global involvement because of 1. The spirit of the American people captured by the idea of the frontier and, 2. The belief it was the duty of America to maintain peace of all nations. The consequences of this increased global involvement on American Society was 3. The clashing views of the imperialist and anti-imperialist parties.…

    • 1173 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ids Paper 3

    • 1015 Words
    • 3 Pages

    In the book, Down the Asphalt Path, Clay McShane constructed an argument trying to disprove the theory of “technological determinism”. This is the idea that technology influences society, society doesn’t influence technology. Although the author has many views against the premise, he is not entirely correct. In my opinion, the car shaped the landscape of American cities. More arguments can be made to prove technological determinism and how it has changed society.…

    • 1015 Words
    • 3 Pages
    Good Essays

Related Topics