preview

Denial Of Services Attack Essay

Decent Essays

Denial of Service attack (DoS attack) are attacks making the computer unusable and the programs unavailable as systems flood a user’s bandwidth Historically, a computer system is overloaded with false requests and data, causing the system to go into shock and crash. The multiple attacks from different IP addresses, sometimes thousands, making it hard for the computer to pinpoint the source. Used in large and layered networks, using multi-threaded OSI layered attacks and a pre-scanned reconnaissance usually disguised as legitimate traffic, the malware infiltrates databases and destroys resources. Causing the unavailability of websites and/or dramatically slow processing. The first known use of DoS attack was done by Khan Smith in 1997, …show more content…

XXS attacks have been prevalent since the early 90s and have infected social media sites like Twitter, Facebook, and Myspace.

Session hijacking and man-in-the-middle attacks are ones that go after and try to intercept TCP (Transmission Control Protocol), ‘a standard that defines how to establish and maintain a network conversation via which application programs can exchange data (Rouse).’ Once the TCP connection is intercepted, the attacker inserts itself and modifies the data in the intercepted communication. Session jacking can be done by taking the id# of a session server or using cross-site scripting to create a malicious link, giving the attacker access to the current session. Ransomware has become a tool by cyber criminals to profits from vulnerabilities of cybersecurity. Considered one of the biggest threats to cyber security by the FBI (Federal Bureau of Investigation). Ransomware using clone- and spear- phishing techniques to manipulate large networks within Hospitals, school districts, state and local governments, law enforcement agencies, or large businesses—to inject malware that encrypts, or locks, valuable digital files and demands a ransom to release them (Fbi .gov). As hackers have evolved from wanting individual fame for their prolific virus programs, they have begun to see compensation for the release or disinfection of one’s system. Ransomware is a main factor in the growing

Get Access