ISOL632 University of the Cumberlands DDOS Attack Plan Discussion

User Generated

axneen08

Writing

ISOL632

University of the Cumberlands

Description

Case Study

1. Why is it critical for an organization to have a DoS attack response plan well before it happens?

2. Use the four steps of the NIST computer security process to write a summary and analysis of each of the steps in a DDoS attack scenario.

a. Step 1 - Preparation: What steps would you take to prepare for this type of incident?

b. Step 2 - Detection and Analysis: Steps you would need to take in order to detect a potential DDoS incident and confirm if the incident is accurate

c. Step 3 - Containment Eradication and Recovery: What actions do you need to take to contain and recover from a DDoS incident

d. Step 4 - Post-Incident Activity - Describe the steps you would take post incident

Case Study Guidelines

Make sure to follow APA style. Please make sure your submission is 2 - 3 pages in length and meet the minimum APA formatting guidelines:

• 12-pt, Times New Roman font
• Double-spaced
• 1” margins on all sides
• Paraphrasing of content – Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.
• Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. If you need guidance or a refresher on this, please visit: https://owl.english.purdue.edu/owl/resource/560/10... (link is external) Be sure to include at least three (3) reputable sources.
• In-text citations – If you need additional guidance, please visit: https://owl.english.purdue.edu/owl/resource/560/02... (link is external)

Discussion

Read the open case scenario called viral vandal, describe the detection and analysis steps in this case. What would you do to contain and eradicate this threat?

Discussion Guidelines

DQ requirement: posting to be between 200-to-300 words. post must contain a properly formatted in-text citation and scholarly reference.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

OUTLINE
1. Importance of DoS attack response plan
2. Summary and analysis of the attack scenario
3. Discussion
4. Reference


Running head: CYBER ATTACK

1

DoS Attack and Viral Vandal
Name
Institutional Affiliation
Instructor

CYBER ATTACK

2

CASE STUDY
Importance of DoS attack response plan
DoS (Denial of Service) attack regards making the organization’s resources and services
to become unusable. The threat is a malicious trial by various systems to create network
unavailability to the intended users. The attempt is achieved by interrupting and suspending the
services and resources connected to the internet (Singh, Dhindsa, & Bhushan, 2017). Therefore,
the organization must have a response plan for the DoS attack before it happens since it is
challenging to make a recovery upon its occurrence. Organizations should create a business
continuity plan having several steps to counter the attack. DoS attack response plan will enable
business continuation despite the threat occurrence. The steps involved will allow the
organization to detect, analyze, eradicate and recover from the consequences of DoS (Elejla,
Anbar, & Belaton, 2017).
Summary and analysis of the attack scenario
Steps 1 – Preparation for DoS incident
Preparation for the potential occurrence of DoS attack involves four stages (Kalkan, &
Alagoz, 2017);
a) Consider the over-provisioning of services and resources in advance
The step consists of developing the system without a strict budget since DoS incident
requires different changes on the resources and services to manage the threat. Resource
allocation should have space for error to allow for the emerging agencies to control the Denial of
Service threat.

CYBER ATTACK

3

b) Consider asking for help during emergencies
DoS attacks increase every year; therefore, it is critical to engage different firms in the
prevention of the problem before it occurs. DoS threat appears to be more expensive since it
happens within the organization websites. Involving the relevant firms’ more, so the security
sector will enable business organizations to address the attack and find a solution before the
event.
c) Quickly dumping the log files during the DoS attack
Having a quick dump to the log files during the incident is the first strate...


Anonymous
Really useful study material!

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Related Tags