Question

In: Computer Science

IN YOUR OWN WORDS PLEASE! Don't plagiarize please What specific concepts from below do you find...

IN YOUR OWN WORDS PLEASE! Don't plagiarize please

What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument.

Encapsulation

Denial of service / distributed

Integrity checking

For protecting authentication data

Solutions

Expert Solution

If You have Any Query Regarding this please ask in comment section I will be there to solve all your query in comment section immediately hope you will like it

So in my words I think DDOS is most special concept in field of cybersecurity because it can be greater threat to us to under stand the concept of DDOS I will be explaining with an example so that you can clearly understand what is DDOS

  • For reference, imagine you are in class of 100 students and you can ask teacher anything and the teacher has to response every request, its ok if only one person ask question from teacher at one time and teacher can easily response back to that personerson.
  • If one student is asking immediately question after question, it is easy for the teacher to answer for some time, but once the teacher get annoyed he stop answering .(This is DOS attack by the Student.)When one computer send alots of packets to server at one time.
  • Now the back benchers started teasing the teacher and all of them asked the teacher so teacher have to reply every query .This made teacher to loose his temper and slowly it gets difficult to answer everyone's query. Suddenly all 100 student done the same and teacher get angry and stop answering.( This is distributed DOS attack by 100 students.) When a network of thousand of computers sends packets to the server and server is not able to handle the request from the computers.

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash. In both instances, the DoS attack deprives legitimate users (i.e. employees, members, or account holders) of the service or resource they expected.

What is the goal behind a DDoS attack?

The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability.

The website can become slow to respond to legitimate requests. So legitimate traffics can’t reach the website. The website can be disabled or shut down entirely, making it impossible for legitimate users to access it.

How to identify a DDoS attack?

The most obvious symptom of a DDoS attack is a site or service suddenly becoming slow or unavailable. Of course, there may have legitimate reasons like instant spike in real traffic, server issues, etc.

Some other reasons signs of a DDoS attack may include:

Huge amounts of traffic originating from a single IP address or IP range

Increase in bounce rate on a specific page or on the whole website.

A flood of traffic from users who share a single behavioral profile, such as device type, geolocation, or web browser version

Odd traffic patterns such as spikes at odd hours of the day or in every alternate hour.

To support my argument I will why it is most dangerous attack in cybersecurity

DDoS attack is dangerous because :

  1. Its very difficult to predict the location of the attacker because in DDoS the attacker after settings bots detachs himself from the connection and thats why there is no presence of attacker.
  2. This attack continuosly sends requestes to the server and after a time the request buffer gets fully filled by requests and the clients of that server are not able to make a connection to the server or prevent them from accessing the resourses.

And because of this the company may face huge losses.

IMPACT OF DDOS ATTACK

Money, time, clients and even reputation can be lost in the event of a DDoS attack. Depending on the severity of an attack, resources could be offline for 24 hours, multiple days or even a week

In fact, a survey revealed that one in five DDoS attacks can last for days or even weeks, attesting their sophistication and serious threat posed to all businesses.

During an attack, no employees are able to access network resources, and in the case of Web servers running eCommerce sites, no consumers will be able to purchase products or receive assistance. The dollar figure varies, but companies can lose $20,000 per hour in the event of a successful attack.

It's also important to consider the impact for "bot" computers used in the attack. While these are often thought of as willing culprits, they are in fact bystanders who get caught in the crossfire because of vulnerabilities in their systems. In some cases, inherent security issues may allow a Trojan virus to slip onto a company network and infect computers, while in others, employees are the cause when they open unknown email attachments or download unverified files. During a DDoS event, these secondary victim devices also run slowly and may crash if the drain on their own resources becomes too great. Even if they remain operational, the systems will not respond well to legitimate requests for service.

I HOPE YOU LIKE THE ANSWER PLEASE UPVOTE ME FOR MY EFFORTS THAT I PUT IN ANSWERING THE QUESTION SO PLEASE HIT THE LIKE BUTTON .THANK YOU.


Related Solutions

What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity?
  What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Encapsulation Denial of service / distributed Integrity checking For protecting authentication data
What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity?
  What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Encapsulation Denial of service / distributed Integrity checking For protecting authentication data
Please don't copy and paste answers from several sources. Write in your own words! Do you...
Please don't copy and paste answers from several sources. Write in your own words! Do you feel teams help or hurt creativity? Give specific examples. How should you handle a freeloader (someone not willing to do their share of the work) on a team where you are a member? Be specific. For an organization where you have worked, list three ways the organization helped you do your job. (This can be any type of organization if you have never worked.)...
What specific concepts from the ones listed below do you find the most interesting and/or impactful...
What specific concepts from the ones listed below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Applications of Cryptography and PKI Trust relationships Password guessing / cracking Public Key Infrastructure Certificates Key Management (creation, exchange/distribution) Common Cryptographic Protocols Types of Attacks (brute force, chosen plaintext, known plaintext, differential...
What specific concepts from the ones listed below do you find the most interesting and/or impactful...
What specific concepts from the ones listed below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Applications of Cryptography and PKI Trust relationships Password guessing / cracking Public Key Infrastructure Certificates Key Management (creation, exchange/distribution) Common Cryptographic Protocols Types of Attacks (brute force, chosen plaintext, known plaintext, differential...
In your own words, NO PLAGIARIZE, what is a research proposal and how is it different...
In your own words, NO PLAGIARIZE, what is a research proposal and how is it different from a research paper? 200-300 wording please!
In your own words using 500 or more NO PLAGIARIZE, What are the effects of unemployment...
In your own words using 500 or more NO PLAGIARIZE, What are the effects of unemployment and inflation on the nation’s economy? Which one between unemployment and inflation do you think is more important to stabilize if the policymaker cannot do both at the same time? Discuss in detail.
Please answers on your own words don't copy from other writers in this website or from...
Please answers on your own words don't copy from other writers in this website or from other websites I need 0% plagiarism​​​​​​​. Note. please don't copy from other writer here in Chegg or other web because it will be plagiarism​​​​​​​ coz maybe some student already submitted so it will match so please if you will copy from other source don't answer.just make sure its your own words. thanks answer the following: A. A company wants to implement good internal control....
Answer the below question in your own words please do not copy and paste. 4. What...
Answer the below question in your own words please do not copy and paste. 4. What is an industry that is in the maturity phase of the life cycle? How intense is the competition? 5. What is an example of an industry in the decline stage? What strategies are the current firms following? 6. Can you think of a firm that has completed a successful (or unsuccessful) turnaround?
please don't use handwriting .. use your own words i need unique answer .. please don't...
please don't use handwriting .. use your own words i need unique answer .. please don't copy and paste Q1.Dala Corporation is considering a project, which will involve the following cash inflows and (out) flows Details Amount Initial Outlay SAR (400000) After 1 Year SAR 40000 After 2 Years SAR 300000 After 3Years SAR 300000 What will be the NPV of this project if a discount rate of 15% is used? _________________ Q2.Merck Inc. is about to undertake a project...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT