Question

In: Computer Science

List and describe at least two types of online intrusion. How does it affect your system?...

List and describe at least two types of online intrusion. How does it affect your system? What potential harm can they cause to you or your device? For each choice, explain how you can defend your system.

In 2016 a massive DDoS attack against a cloud service company called Dyn shocked security experts. Look for information about this attack online. How many IP addresses or devices were involved in this attack? What was the name of the malware? Name some of the Internet sites that were affected by this attack.

Solutions

Expert Solution

Asymmetric Routing

In this method, the attacker attempts to utilize more than one route to the targeted network device. The idea is to have the overall attack evade detection by having a significant portion of the offending packets bypass certain network segments and their network intrusion sensors. Networks that are not set up for asymmetric routing are impervious to this attack methodology.

Buffer Overflow Attacks

This approach attempts to overwrite specific sections of computer memory within a network, replacing normal data in those memory locations with a set of commands that will later be executed as part of the attack. In most cases, the goal is to initiate a denial of service (DoS) situation, or to set up a channel through which the attacker can gain remote access to the network. Accomplishing such attacks is more difficult when network designers keep buffer sizes relatively small, and/or install boundary-checking logic that identifies executable code or lengthy URL strings before it can be written to the buffer.


Related Solutions

Select at least two of the following types of organizations and describe at least two types...
Select at least two of the following types of organizations and describe at least two types of standard costs they might use: Cleaning service Insurance agent/agency Physician’s office Lube and tire shop Additionally, explain the types of direct and overhead variances each of your selected organizations might encounter. Provide an example of each.
Describe at least two e-discovery online resources
Describe at least two e-discovery online resources
List at least four different types of learning styles. Complete an inventory and describe your learning...
List at least four different types of learning styles. Complete an inventory and describe your learning style
List 3 types of mutations in DNA sequence. How does each affect the resulting protein?
List 3 types of mutations in DNA sequence. How does each affect the resulting protein?
What types of intrusion detection have been implemented in your organization?
#1) What types of intrusion detection have been implemented in your organization? If you do not work for an organization, research different intrusion detections and describe how it works.#2) A company has suffered a data breach. Investigators are able to establish exactly when the data breach occurred, but on checking the IDS logs, no evidence of the breach is present. What type of intrusion detection error condition is this?
• Describe what is meant by an addiction • List at least five types of addictions...
• Describe what is meant by an addiction • List at least five types of addictions • Discuss at least five significant areas that can be affected by addictions • Describe four measures that can aid in healing the body of the addict
describe at least two factors that indicate how the global economy can affect value chains and...
describe at least two factors that indicate how the global economy can affect value chains and business processes. Use a real work example from your personal experience, or through Internet research
System Analysis Discuss the business rules for locating and purchasing a book online. How does your...
System Analysis Discuss the business rules for locating and purchasing a book online. How does your system definition impact those rules
Describe the communications objectives. Select at least three online media and describe in detail how these...
Describe the communications objectives. Select at least three online media and describe in detail how these media will appeal to your two targeted market segments. Develop a message to be delivered through the three online media. The message should contain the key information you want to communicate to your target markets and might include benefits of the product or service, key features, prices and promotions, and where to buy. Develop a budget for message development and placement of the message...
In your own words, describe UML. Identify at least two types of UML diagrams that can...
In your own words, describe UML. Identify at least two types of UML diagrams that can be used in software development; describe when these diagrams are used. You are describing the registration process to a group of first time students at Ivy Tech. Realizing that a visual representation would be helpful in your explanation, you decide to use a UML diagram. What diagram do you choose to use? Why?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT