Miss Natalia

(14)

$20/per page/Negotiable

About Miss Natalia

Levels Tought:
Elementary,High School,College,University

Expertise:
Accounting,Business & Finance See all
Accounting,Business & Finance,Calculus,Computer Science,Environmental science,Health & Medical Hide all
Teaching Since: Apr 2017
Last Sign in: 264 Weeks Ago, 6 Days Ago
Questions Answered: 6064
Tutorials Posted: 6070

Education

  • Doctor of Education in Educational Leadership with a Specialization in Educational Technology
    Phoniex University
    Oct-1999 - Nov-2005

Experience

  • HR Executive
    a21, Inc.
    Nov-1998 - Dec-2005

Category > Information Systems Posted 07 May 2017 My Price 8.00

Discuss atleast two solutions how this attack can be avoided or mitigated.

 

Assignment Description

 

Part A: (15 Marks)

Distributed denial of service (DDoS) attacks present a significant security threat to corporations. In one study, covering a three-week period, investigators observed more than 12,000 attacks against more than 5000 distinct targets, ranging from well-known ecommerce companies such as Amazon and Hotmail to small foreign ISPs and dial-up connections. DDoS attacks make computer systems inaccessible by flooding servers, networks, or even end user systems with useless traffic so that legitimate users can no longer gain access to those resources. In a typical DDoS attack, a large number of compromised hosts are amassed to send useless packets. In recent years, the attack methods and tools have become more sophisticated, effective, and more difficult to trace to the real attackers, while defence technologies have been unable to withstand large-scale attacks. A denial of service (DoS) attack is an attempt to prevent legitimate users of a service from using that service. When this attack comes from a single host or network node, then it is simply referred to as a DoS attack. A more serious threat is posed by a DDoS attack. In a DDoS attack, an attacker is able to recruit a number of hosts throughout the Internet to simultaneously or in a coordinated fashion launch an attack upon the target.

 

 

Figure 1

 

1)     Using the given DDoS attack diagram in Figure 1, identify type of DDoS attack andjustify in detail how this attack will affects the Victim’s workstation.

2)     Discuss atleast two solutions how this attack can be avoided or mitigated.

 

Marking Criteria:



Section to be included in the report

Description of the section

Marks

Introduction

Description of selected topic

2

Analyse

Analyse identified issues

6

Evaluate/justification

Write justification of your evaluation

4

Conclusion

Write summary of the report

2

Reference style

Follow IEEE reference style

1

 

Total

15

 

 

Part B: (15 Marks)



It is important for networking professionals to stay abreast of new security threats and learn how to address them. In this task, you will look at some web resources that can help you find out about vulnerabilities on your network. For this task, you will need a workstation with internet connectivity and a web browser.



1)     Connect to the internet and point your browser to the following:

https://technet.microsoft.com/en-us/security/advisories

 

2)     View the entire list of published security advisories. Scroll through and find any twovulnerabilities related to Microsoft product that’s familiar to you such as windows, web browsers or Microsoft office. Click the advisory’s title and number in the left column to view the entire announcement.

 

3)     Read the description of the problem and how it has been addressed. How was the problem discovered and reported? How could someone exploit this vulnerability? Does the potential vulnerability belong to any of the categories you learned such as DDoS, Brute Force, Phishing etc? What are the potential damages this vulnerability could cause, if exploited?  

 

Marking criteria:

 

Section to be included in the report

Description of the section

Marks

Introduction

Description of each vulnerability

2

Answering question #03

Answering in detail in your own words

10

Conclusion

What have you learned from this task

3

 

Total

15

     
     
     
     
   
 

Answers

(14)
Status NEW Posted 07 May 2017 08:05 AM My Price 8.00

Sol-----------uti-----------ons----------- fi-----------le ----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------you----------- fo-----------r y-----------our----------- in-----------ter-----------est----------- an-----------d b-----------uyi-----------ng -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I-----------

Not Rated(0)