Access over 40 Millions of academic & study documents

Cyb 670 Project 2 Fvey 1

Content type
User Generated
Subject
Cyber Security
School
University of Maryland Global Campus
Type
Homework
Showing Page:
1/9
CYBERSECURITY PROJECT 1
Cybersecurity Project
Name
Instructor
Course
Institution
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/9
CYBERSECURITY PROJECT 2
Cyber Security Project
Denial of Service
Cybersecurity is an emerging issue within the global sphere due to the sudden surge in
technology, which is now taking over the world. Technological innovation is at an all-time high,
and people are storing increasing amounts of information within cyberspace. This has led to the
development of cybercriminals, who seek to gain access to and utilize the information for
malicious purposes. Therefore, it is imperative that cybersecurity measures be implemented to
protect data from any form of theft or damage. This team of analysts has evaluated different
forms of data attacks and examined how they gain access to crucial data such as health records,
payment records, and even personal files, intending to cause some form of damage to their target.
A close examination of the PCAP records reveals the presence of a Denial-of-Service (DOS)
attack. This is a form of cybercrime where the criminals intend to make certain machines or
mechanisms inactive for a set period of time to stop their intended users from having full access
or control (Bonguet & Bellaiche, 2017). It typically targets machines and users with internet
connectivity and is executed by bombarding the victim with unusually high amounts of traffic or
information, causing the system to crash.
For such an attack, an organization could be rendered out of service for the duration of the
attack, which could have huge connotations depending on the intended operations of the victim.
For instance, a Denial-of-Service (DOS) attack on a government agency could be the difference
between life and death for citizens, particularly if it involves crucial bodies like security and
intelligence services ("How cyberattacks could gridlock New York City", 2019). To mitigate the
chances of such attacks happening, organizations need to develop secure network infrastructure.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/9

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 9 pages?
Access Now
Unformatted Attachment Preview
CYBERSECURITY PROJECT 1 Cybersecurity Project Name Instructor Course Institution Date CYBERSECURITY PROJECT 2 Cyber Security Project Denial of Service Cybersecurity is an emerging issue within the global sphere due to the sudden surge in technology, which is now taking over the world. Technological innovation is at an all-time high, and people are storing increasing amounts of information within cyberspace. This has led to the development of cybercriminals, who seek to gain access to and utilize the information for malicious purposes. Therefore, it is imperative that cybersecurity measures be implemented to protect data from any form of theft or damage. This team of analysts has evaluated different forms of data attacks and examined how they gain access to crucial data such as health records, payment records, and even personal files, intending to cause some form of damage to their target. A close examination of the PCAP records reveals the presence of a Denial-of-Service (DOS) attack. This is a form of cybercrime where the criminals intend to make certain machines or mechanisms inactive for a set period of time to stop their intended users from having full access or control (Bonguet & Bellaiche, 2017). It typically targets machines and users with internet connectivity and is executed by bombarding the victim with unusually high amounts of traffic or information, causing the system to crash. For such an attack, an organization could be rendered out of service for the dur ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4