Access over 20 million homework & study documents

Defending Against Ddos

Content type
User Generated
Subject
Cyber Security
Type
Homework
Rating
Showing Page:
1/4
Running head: DEFENDING AGAINST DDOS 1
Defending against DDoS
Student Name
University Affiliation
Date of Submission

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
DEFENDING AGAINST DDOS 2
There are different forms of attacks that organizations are facing. One of these cyber-
attacks includes Distributed denial of service (DDoS) attacks (Dahiya & Gupta, 2021). This is a
form of attack known to be designed for overloading the servers or disrupting an organization's
network by overwhelming them with any form of access to different requests. The attacker often
features the use of botnets when conducting this form of attack on an organization. There are
different forms of DDoS attacks that are likely to be directed to an organization. Some of these
attacks include volumetric attacks, application-layer attacks, and other forms of attacks (Dahiya &
Gupta, 2021).
In the last six months, an example of this form of attack includes the Linux Devices that
the New Freak-out Malware attacked reported on 19 January 2021 (Linux Devices Under Attack
by New FreakOut Malware, 2021). Researchers warned of a novel malware that targets different
Linux devices. The malware is featured with different port-scanning capabilities, the data packet
and information gathering, and network sniffing. The malware is noted to be adding infected Linux
devices to a botnet and launching DDoS and flooding of the network to cause an attack. Any time
its activities are achieved, the infected devices are being used as a platform for remote control by
the threat actors working on the attacks and hence expanding the infected machines in an
organization.
Different ways could have been implemented to prevent the occurrence of a DDoS attack.
Some of these approaches include developing a Denial-of-Service Response plan that helps to
respond to these kinds of attacks, securing the network infrastructure of an organization, practicing
network security that will help to improve the network in an organization, leveraging the use of
cloud computing that is featured with different advantages to lead to improved security and also

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
Running head: DEFENDING AGAINST DDOS Defending against DDoS Student Name University Affiliation Date of Submission 1 DEFENDING AGAINST DDOS 2 There are different forms of attacks that organizations are facing. One of these cyberattacks includes Distributed denial of service (DDoS) attacks (Dahiya & Gupta, 2021). This is a form of attack known to be designed for overloading the servers or disrupting an organization's network by overwhelming them with any form of access to different requests. The attacker often features the use of botnets when conducting this form of attack on an organization. There are different forms of DDoS attacks that are likely to be directed to an organization. Some of these attacks include volumetric attacks, application-layer attacks, and other forms of attacks (Dahiya & Gupta, 2021). In the last six months, an example of this form of attack includes the Linux Devices that the New Freak-out Malware attacked reported on 19 January 2021 (Linux Devices Under Attack by New FreakOut Malware, 2021). Researchers warned of a novel malware that targets different Linux devices. The malware is featured with different port-scanning capabilities, the data packet an ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Documents