LOT2 Task 1

 LOT2 Activity 1 Essay

п»ї

LOT2 Job 1

Competency 426. 4. 4: Refusal of Servive (DoS)

Bill J. Lawson

MS Information Security & Assurance -- 5/1/13

Scholar ID: 000311942

My Advisor: Mary Gordon

c: 317-448-3045

Indianapolis, IN - Eastern Time

[email protected] wgu. edu

B. Advise in an business summary measures to countertop this type of 2 Attack. Business Summary

The university or college network was a victim of your DDoS attack. Whereby a cyber felony first attained administrator get. We suspect that the attacker gained access to the network from an indoor computer, probably from students PC in one of the labs. The attacker probably used keylogger software to learn administrator credentials. Once the attacker had the administrator access the systems he/she could create Crawlers and push to many college student PCs found in various labs. The attacker then trigger a control attack simply by activating the BOT's in order to form a BotNet (a. k. a. Zombie Network) with the target of purposely causing on the web services to get unusable to students (ICECC, 2009). It is important to note a single ROBOT alone wasn't able to have trigger the enrollment server not available. It was the combined effect of using many BOTs simultaneously that created the attacker's desired effect of overflowing the resources of the subscription web hardware and rendering it unusable. Recommendation to Table this type of DoS attack

To avoid or limit the impact of keyloggers:

Deploy a firewall to dam known keylogger software.

Educate center not to wide open email by unknown users and not to click on links in e-mails from unfamiliar users. Produce a Policy where users simply cannot install fresh software to a machine without opening a ticket with the helpdesk or asking for administrator access (ICECC, 2009). The student computer systems should be preloaded with all required applications. Deploy a file monitoring program, just like Tripwire to detect and notify in the event that any alterations have occurred to...

References: Worldwide Council of Electronic Trade Consultants (2009). Ethical hacking and

countermeasures: Attack phases. (Vol. 1). Course Technology, Cengage Learning.

International Council of Electric Commerce Consultants. (2009). Honest hacking and

countermeasures: Hazards and body. (Vol. 2). Course Technology, Cengage

Learning.

Schifreen, R. (2006). Defeating the hacker: A non-technical guide to computer protection. John Wiley &

Sons.

 Long Life Article

Long Life Article

WaterAid in Pakistan Water Top quality Testing Protocol November, 2010 This protocol and guidance are necessary for all partner 0rganizations putting into action water supply elements…...

Read..
 Essay about Great Gatsby

Essay about Great Gatsby

The facts Behind American Dream Considering that the birth of the nation, America have been placed on a pedestal for others in international land to admire, yearn, desire…...

Read..
 Cyber Lovato Essay

Cyber Lovato Essay

Jose, Mia Eng: 22 several: 15-4: 30 Is Cyber-bullying really a difficulty? Bullying has been online forever yet cyber lovato is different as it lets…...

Read..
 Federalist Paperwork

Federalist Paperwork

The Federalist Documents Several files have helped carve america government right from the start into what we should know it while today…the Magna Carta, the Mayflower Small, the Declaration…...

Read..
 Ap Lang 11 22 Essay

Ap Lang 11 22 Essay

Logical fallacy (11/22) In the approaching election you could have a choice between voting to me or voting for monetary irresponsibility. This can be an either-or…...

Read..
 Truong Thanh Essay

Truong Thanh Essay

COMMENT CONTENTS OPENING1 I. COMPANY AND PRODUCT2 1 . Company introduction2 installment payments on your Reason for choosing indoor furniture2 II. U. S…...

Read..