Information security discussion questions

User Generated

f00f

Computer Science

Description


3. How does a SQL injection attack take place?

Attachment preview

Write your response to each of the three

1. What are the common tools used for DoS?

2. How does a Virus spread?

3. How does a SQL injection attack take place?

Directions:

• Combined, your responses should be 4-5 pages in length, not including the title or reference pages.

• Be sure to provide citations from your readings and additional research to support your statements.

• Your paper must follow APA style guidelines, as appropriate.

Unformatted Attachment Preview

Write your response to each of the three 1. 2. 3. What are the common tools used for DoS? How does a Virus spread? How does a SQL injection attack take place? • • • Directions: Combined, your responses should be 4-5 pages in length, not including the title or reference pages. Be sure to provide citations from your readings and additional research to support your statements. Your paper must follow APA style guidelines, as appropriate.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, please see the attached paper. Have a look at it and in case of any edit, please let me know. Otherwise, it is my pleasure to have you as my buddy now and future. Until the next invite, Bye!

Running head: INFORMATION SECURITY

1

Information security
Student’s Name
Course
Institutional Affiliation

INFORMATION SECURITY

2
Information security

The standard tools used for DoS
Denial of service (DoS) is an attack in which the attacker sends a counterfeit to the
targeted entity such that it is difficult to distinguish between legitimate and attack traffic (Elejla,
Anbar & Belaton, 2017). The entity, therefore, exhausts its resources to the attack traffic while
not knowing that the legitimate traffic does not get the resources. The attackers make the process
complicated by creating traffic that seems reasonable to the entity. Some of the common reasons
why attackers do DoS includes hactivism, rendering the site useless, as well as for ransom. The
DoS attack has significant consequences such as loss of business revenues, reduced performance,
unsatisfied customers and the loss of business reputation (Elejla et al., 2017). The common tools
used for DoS include LOIC, HOIC, RUDY, Slowris, XOIC, and PyLoris.
LOIC
It is a DoS tool that once the user knows the target address of the website and the kind of
attack to execute, it becomes easy to attack the entity. It has a simple GUI divided into four parts
namely the target selection, the ready status which the attacker use for fun and the attack option
by sending several messages to the targeted entity such and the system becomes overloaded
hence crushing.
HOIC
It is an open source DoS tool which is capable of attacking at least 256 targets
conc...


Anonymous
Just what I needed…Fantastic!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags