IT4071- A2 (1)

.docx

School

Capella University *

*We aren’t endorsed by this school

Course

4071

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

5

Uploaded by CommodorePenguin2708

IT4071– A2 1 Denial Of Service Janie Craig Capella University IT4071 - Assignment 2 02/14/24
IT4071– A2 2 Denial Of Service One threat that needs to be addressed is the DoS (Denial of Service) and DDoS (Distributed Denial of Service) attack. These malicious attacks can disrupt your services and cause significant damage to the business. In this paper we will go over what each attack is and how they can cause the organization harm. DoS and DDoS attacks A DoS attack is an attack that can disrupt a network, network application, website or service or temporarily shut it down. “An example of where this may happen would be during Black Friday sales.” During this time there are so many people on these websites with sales that it can cause a denial of service. They can be malicious during this time to where they can purposely cause this issue to happen during this time. This attack can make it where the users cannot access what they need to. The DoS attacks can flood the system with traffic or send certain information or malware that triggers the failure in some way of it. Malware can be used to mess up the flow of the data going in and out of this system and making it inaccessible for the intended users. A DDoS attack is similar to a DoS attack, but the DoS does use a single Internet- connected device to flood a target with malicious traffic. A DDoS can be launched through multiple corrupted devices; generally this is done globally through these corrupted devices which would be called a botnet. Three common types of these DDoS attacks can be Volumetric, Protocol, and through an Application layer attack.
IT4071– A2 3 Denial Of Service Differences between DoS and DDoS The differences between a DDoS attack and a DoS attack is that a DDoS attack is generally faster than the DoS attack. As stated above as well the DDoS involves multiple devices that can cause so much traffic to this website or application that it causes it to crash, shut down, and more. A DDoS attack uses the botnets that the potential hackers use, the DoS usually come from a DoS tool or script. During the DoS attack the attacker can send the packets directly to the intended target. The relationship between DDos attacks and botnets The DDoS attack can use botnets to assist in attacking a targeted system. A botnet can be built to assist in sending spam, ransomware, causing a DDoS attack, or even stealing data. “Generally botnets establish full TCP connections during an attack, which is what makes them so hard to block. It's basically layer 7 DDoS that can be modified to do as much harm as possible to any application.” DDoS can cause a business’ service to be disrupted which can cause financial and reputational harm.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help