Access over 35 million academic & study documents

Alexa

Content type
User Generated
Subject
Computer Science
School
Keller Graduate School of Management
Type
Homework
Showing Page:
1/5
Running head: COMPUTER SCIENCE 1
Computer Science Discussion
Student’s Name
Course Number
Professor’s Name
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
COMPUTER SCIENCE 2
List three network threats and list the IT infrastructure domain that the threat may
harm. Why/How do those threats harm that particular domain?
The varied dangers and exposures encountered by IT systems open to the internet
reflect the broad character of cybercriminal motivations. DDOS attacks, phishing, and man-
in-the-middle attacks are just a few examples of web dangers. The User Domain is most
prone to be harmed by a DDOS assault due to denial of service. As a consequence of the
rising number of gadgets in the office, DDoS is more common than before. In these cases,
fraudsters divert enormous quantities of internet traffic to an online service using multiple IP
addresses. DDOS assaults flood servers with enormous traffic demands, blocking the user
server and preventing users from receiving requested software and information. Everyone
who utilizes cloud services or internet sites is vulnerable to DDoS attacks. As a result of the
hampered service provision, denial of service may degrade the end-user quality when
utilizing the program (Sharafaldin, Lashkari, Hakak, & Ghorbani, 2019, October). For online
firms, it can also be devastating. A single-day DDoS assault can cost tens of millions of
dollars in revenue.
Within the Remote Access Domain, man-in-the-middle attacks are foreseen; the
wireless transmission of information enables a hacker to monitor the conversation and mimic
the recipient and transmitter, resulting in miscommunication. Any private data delivered
across a medium that a Man-in-the-Middle assault has compromised prone to end up in the
hands of the attacker. Based on the objective and aim, MitM can involve a wide range of
strategies and results. FOR INSTANCE, in SSL stripping, criminals create an HTTPS link
with the interface but an unprotected HTTP link with the browser, resulting in data being
delivered in a clear format without encrypting.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Running head: COMPUTER SCIENCE 1 Computer Science Discussion Student’s Name Course Number Professor’s Name Date COMPUTER SCIENCE 2 List three network threats and list the IT infrastructure domain that the threat may harm. Why/How do those threats harm that particular domain? The varied dangers and exposures encountered by IT systems open to the internet reflect the broad character of cybercriminal motivations. DDOS attacks, phishing, and manin-the-middle attacks are just a few examples of web dangers. The User Domain is most prone to be harmed by a DDOS assault due to denial of service. As a consequence of the rising number of gadgets in the office, DDoS is more common than before. In these cases, fraudsters divert enormous quantities of internet traffic to an online service using multiple IP addresses. DDOS assaults flood servers with enormous traffic demands, blocking the user server and preventing users from receiving requested software and information. Everyone who utilizes cloud services or internet sites is vulnerable to DDoS attacks. As a result of the hampered service provision, denial of service may degrade the end-user quality when utilizing the program (Sharafaldin, Lashkari, Hakak, & Ghorbani, 2019, October). For online firms, it can also be devastating. A single-day DDoS assault can cost tens of millions of dollars in revenue. Within the Remote Access Domain, man-in-the-middle attacks are foreseen; the wireless transmission of information enables a hack ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4