logo

Information Security Report 2022

   

Added on  2022-09-30

13 Pages2425 Words20 Views
Information Security 1
Information Security
My Name
Course Title
Professor name
Date

Executive Summary
DDOS attacks are aimed at flooding the target machine with illegitimate traffic to ensure
their availability to legitimate users.The DDOS attacks have evolved from traditional DDOS, to
more low traffic DDOS attacks. All these attacks have been successful in the recent past
including the well executed Github attacks, Spamhaus attacks and Dyn attack. To ensure
companies become prepared for such attacks, the following key recommendations have been
identified,
First ensure the coding is done with security in mind using the SecSDLC.
Second,companies should develop cyber incident response plans and teams
Third,keep the patches up to date to avoid vulnerability exploitations
Fourth,don’t expose the admin interfaces as much as possible
Lastly, keep the computing environment secure using strong authentication and authorisation
procedure

Executive Summary 2
Introduction 4
Body 5
Denial Of Service 5
Traditional distributed denial-of-service attack 6
Low Rate DDOS 7
Shrew attack 7
Reduction of Quality DDOS Attack 8
Low Rate DDOS against Application Server 8
Known Attacks 9
The 2016 Dyn attack 9
The 2015 GitHub attack 10
The 2013 Spamhaus attack 10
Conclusion 11
Recommendations 11
References 12

Introduction
The advent of the Internet and cloud computing infrastructure have brought with it
varying benefits that include reduced costs of computing infrastre since the cloud computing
environments rely on virtualization technology to ensure efficiency in software, platform and
infrastructure deployments. This has made most organizations to move their computing resources
to the cloud to tap the benefits of this emerging technology (Behal, Kumar, & Sachdeva,
2018).Despite the enormous benefits that accrue to this migration, several security risks remains
key challenge to most organizations who employ the use of the Internet and the cloud. Key
among them include the denial of service which involves deliberate move by adversaries to to
make some computing resources unavailable by flooding the servers with useless requests. This
attacks must be dealt with if the various Internet based transactions are to reliable. In this report,
we focus on the details of the denial of service attacks by explaining in details what it is, giving
example of some well known attacks that have occured in the recent past and key
recommendations given in a bid to reduce the impact of such vulnerabilities (Tripathy,
Chamanbaz, & Bouffanais, 2019) .
The first section of the report provides the meaning of denial of service and dig deep into
the various types of DOS attacks. The second section details the some well documented DOS
attacks which have occurred in the recent past and the level of destruction such attacks have
caused the various industries which they occurred in. The third section concludes the report and
outlines some key steps that companies and organizations can take to reduce the impact of DOS
attacks in their computing environments.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
DDoS Attack at GitHub: Details, Outcome, Impact, and Mitigation
|13
|2099
|392

DDOS attack
|5
|1194
|491

Computer Security: Memcrashed Exploit and Solutions
|14
|3281
|184

Denial-Of-Service and Distributed Denial-Of-Service Attacks
|5
|675
|90

Distributed Denial of Service
|10
|2237
|162

Distributed Denial of Service (DDoS) Attack: An Overview and Real World Example
|10
|2158
|245