Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Visit the web site for the computer emergency response team at www.cert.org/tech

ID: 3751934 • Letter: V

Question

Visit the web site for the computer emergency response team at www.cert.org/tech_tips/denial_of_service.html and answer the following:

A-What are the three basic types of denial-of-service attacks

B- What impact can denial-of-service attacks have on an organization?

C-What other devices of ativities witin an organization might be impacted by denial-of-service attacks?

D-Name three steps organizations might take to prevent denial of service attacks.

E- Contrast cyberharassment, cyberstalking, and cyberbullying using real-world examples found from recent news stories.

Explanation / Answer

A Denial_of_service is an attack meant to shut down a machine or network, making it inaccessible to its intended user.

Types of DoS attack-

Distributed DoS-A DDoS attack occurs when multiple systems orchestrate a synchronized DoS attack to a single target. The essential difference is that instead of being attacked from one location, the target is attacked from many locations at once.

Smurf Attack(or ICMP flood)-In this the attacker sends Internet Control Message Protocol broadcast packets to a number of hosts. The recipients of these packets will then respond, and the targeted host will be flooded with those responses.

SYN flood- Thisoccurs when an attacker sends a request to connect to the target server, but never completes the connection through what is known as a three-way handshake.

Effects of denial_of_service-

-Slow network performance

-unavailability of paticular website

-increase in number of spam email recieved

Though DoS don't try to steal information but it can effect the reputation of the company.Customers can also devade to switch to alternate provider.

Steps that can be taken by organisation to prevent denial_of_service attack-

1-For an organization that depends on servers and Internet presence, it is important to make sure that resources are geographically dispersed and not located in a single data center.

2-Deploy appropriate hardware that can handle known attack types and use the options that are in the hardware that would protect network resources.

3-If affordable, scale up network bandwidth. For volumetric attacks, the solution some organizations have adopted is simply to scale bandwidth up to be able to absorb a large volume of traffic if necessary.

Cyberbulling,cyberharassement and cyber stalking is a form of bullying or harassment using electronic means.If both parties are minors then it is cyberbulling. If one side is adult it is cyberharassement or cyberstalking.It can include posting rumors,threats and sexual remarks.

By means of game any one can ask the general information about player's family,his age,gender ,family income or any other information and can misuse it.If the doer is a child then it is Cyberbulling.If it is an adult it is cyberstalking orcyberharassement.