Hacking
Denial of Service (DoS) John Dough
Insert a University
Scenario
When defending a network against a DoS or DDoS type attack it is important to view it in the correct way. This type of attack can be defended in a number of ways. The first is to prevent malware from entering the network in the first place, which can be addressed by training employees on basic security measures. However this is more of a technique to reduce not prevent attacks. The second way to counteract a DDoS or DoS attack is by a stronger network design and infrastructure.
Suggestions
The first method in providing a countermeasure to a DDoS attack is to eliminate common security violations that could cause you or your network to be susceptible to malware. This entire concept makes me think of a very famous quote by Sun Tzu in the Art of War, “every battle is won before it is ever fought.” If a company can get its staff to marginally reduce the most common security errors then it can significantly improve its chances of preventing an attack. The most common errors are listed below (Perrin, C 2008). 1. Using unsecure emails/computers to send sensitive emails 2. Spamming coworkers and opening personal emails corporate computers 3. Basing passwords on personal information 4. Basing your security on what is currently popular or what vendor recommend, not your needs 5. Inexperienced security personnel working on your staff 6. Not including “testing” as a part of your implementation process 7. Making everything “sensitive” results in nothing being “sensitive” 8. Using badges or other items that can be duplicated or counterfeited
In addition, some DDoS attacks are the results of gathering data that was done in person. For example, gathering data on the practices of your company by a guest or a passerby. This sort of action can lead to dumpster diving, shoulder surfing, collecting business cards, leaving USB’s in a parking lot or lobby as though it were lost and other forms of social engineering. We are at a point in time in history where social networking has become part of not only our personal lives but our professional lives. Companies are making sites like Facebook, Twitter, MySpace, LinkedIn, etc an extension of their company. There are reports of intruders using social networking through these sites to gain information to attack a company. Staff who are on sites like these need to be careful of how much personal data they show and what is private on these sites.
A scenario I’ve recently been made aware of is a person who works at a major defense contracting company. They have many facebook friends and over 75 that are coworkers and work in a variety of government agencies. They “became friends” with a person who they really didn’t that well and that person now had a list of 74 other people to be potential victims and they each had friends that were in the same line of work. In fact, it lead to the internal facebook site which he shouldn’t have been granted access to, but was. He knew his one of his friends work email which lead to him figuring out most of the other peoples email and then launched a series of spam email attacks. Companies like this can’t stop people making friends on facebook with coworkers but do they need to promote joining their page and if so shouldn’t they be more careful of who they add. Some companies are beginning to keep some PII (Personally Identifiable Information) on their pages more private but trolling social networking sites is quickly becoming a popular form of social engineering.
There are also other actions that may seem like common sense but are frequently overlooked such as adhering to a procedures and policies handbook mainstay of not going to inappropriate sites. These sites can be laden with malicious files, spyware, adware or even XSS (Cross Site Scripting) attacks. Any one of these can lead to the opening an intruder is looking for.
The
concern in Atlanta, hurricanes might be a problem in Oklahoma, etc... #17: Denial-of-service attacks are a single user sending a large number of connections in a attempt to overwhelm a target server. Distributed denial-of-seervice is when many users (or many compramized systems) simultaniously perform a denial-of-service attack. The distributed denial-of-service is more dangerous because unlike a denial-of-service, there is no single user you can block, no easy way to overcome it. #20: A buffer…
Countries around the globe are using cyber-warfare as a way to gain valuable information and spy on one another. In 2007 a denial of service attack on the country of Estonia is one example of the damage and negative effects of cyber warfare. “The Estonian attacks began at the end of April 2007, and demonstrated quite profoundly how widely distributed and loosely coordinated denial-of service attacks could affect an entire nation. Initially, only Estonian governmental computer systems were attacked, which…
Score for this quiz: 86 out of 90 Submitted Jul 13 at 1:15pm This attempt took 11 minutes. Question 1 4 / 4 pts ____ was the first operating system to integrate security as its core functions. UNIX DOX Correct! MULTICS ARPANET Question 2 4 / 4 pts ____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse. Correct! Physical Personal Object Standard Question 3 4 / 4 pts A(n)…
operations and messages. They are represented by a logo of a headless suited man, than instead of a head has a question mark. The group has become famous for its forms of hacktivism, including forms of social engineering, web defacement, distributed-denial-of-service attacks (DDoS), and malware software. They are known to release videos using Guy Fawkes masks, a mask popularized by the movie V…
they have. This practice was accepted as being justifiable and no one thought twice about it being prejudicial against individuals having medical problems. Some individuals, including Joe Q. Public, are only offered minimal coverage, excluding any services or procedures pertaining to their preexisting medical condition. This coverage is referred to as limited coverage and those receiving even limited coverage with a preexisting medical condition are lucky, as most people are denied coverage completely…
occurrence of some predetermined data, time, or event? | | A.Logic bomb | | | B.Trojan horse | | | C.Cracker | | | D.Denial of service (DoS) attack | | Answer Key: A | | | Question 2 of 20 | 5.0 Points | Denial of service (DoS) and distributed denial of service (DDoS) attacks have the same effect, however a distributed denial of service (DDos) attack: | | A.involves accessing a system of computers without authorization. | | | B.is launched from large numbers of hosts…
Technology is an ever evolving industry and so is hacking, and people are always trying to find new ways to gain access to places that they are not suppose to be. There are different types of attacks that are categorized as access attacks, denial of service (DoS) attacks, and modification and repudiation attacks. There may be attacks that are also within these types of attacks. First, an access attack is someone who should not be able to wants to access your resources. There are also 4 different…
Denial Class Discussion Questions – I would suggest that you develop notes for these. 1. What is denial and what problems does it lead to? Denial is how we pay attention to everything today; we are constantly making unconscious choice about what to notice, and not to notice. It means when something happened and the person lies to cover up or used to escape from the truth, According to the book, Denial is the unconscious calculus that if an unpleasant reality were true, it would…
Introduction Chase bank is a world renowned banking organization that has been in business for decades. It is under the conglomerate of JPMorgan Chase & Co. which is a leading global financial services firm with assets of $2.6 trillion and operations all across the world. Through various financial services, which included personal banking, small business lending, mortgages, credit cards, auto financing and investment advice. Chase bank has a vast online banking system that most of their customers…
account. Single Sign-On (SSO) allows a user to access the resources when it authenticates the user. Password management synchronizes user passwords across multiple applications as it updates. Strong authentication provides a mixture of protective services. “Directory Management - Manages user accounts within a central setting, in many cases a Lightweight Directory Access Protocol (LDAP) directory. Web Access Control provides user account authorization within Web-based applications.” (Barr, James…