logo

Contemporary Cyber Security Issues

   

Added on  2023-04-11

11 Pages2056 Words79 Views
 | 
 | 
 | 
Running head: CONTEMPORARY CYBER SECURITY ISSUES
Contemporary Cyber Security Issues
Name of the student:
Name of the university:
Author note:
Contemporary Cyber Security Issues_1

1CONTEMPORARY CYBER SECURITY ISSUES
Abstract
The report is prepared to deliberate about the major types of Distributed denial of service
attacks that are taking place in the era off cyber threats. Based on the attack one of the
examples is stated which has been reported to occur in the real world leading to major
disruption of systems. The later part of the report focusses on the impact of the attack that
took place in the real world and based on it some preventive measures are also reflected in
the report.
Contemporary Cyber Security Issues_2

2CONTEMPORARY CYBER SECURITY ISSUES
Table of Contents
Introduction:...............................................................................................................................3
Operation of the attack in the real world:...................................................................................3
Real world example of DNS flooding attack.............................................................................5
Impact of the attack:...................................................................................................................6
Actions taken against the attack.................................................................................................7
Conclusion:................................................................................................................................7
References:.................................................................................................................................9
Contemporary Cyber Security Issues_3

3CONTEMPORARY CYBER SECURITY ISSUES
Introduction:
Distributed denial of service attack is one of the major types of cyber attacks that is
gradually taking up the major of the cyber security threats. The attack is done mainly by
overflowing the network or server with explicit characteristics. The attack is determined
when the attacked network floods with circulation of unwanted requests which tales over the
whole system causing disturbance in the network (Wang et al., 2015). Thus, distributed
denial of service attack prevents users from accessing the sites or the networks and hence as
result a bad customer service experience takes place for the intended website. The flooding of
the network traffic can consist of unwanted incoming messages or fake packets (Bhuyan,
Bhattacharyya & Kalita, 2015). Ann extortion threat of Distributed denial of service attack
may also cause some company to pay the ransomware as demanded by the hacker. Hackers
generally perform this Distributed denial of service attack to divert the attention of the
organisation under their target or to inject some malicious virus into the software used by the
targeted organisation in order to steal data from the company’s database. Almost all
organisations come under the targeted list of the Distributed denial of service attack. The
after effect of the attack is very much dangerous for all sorts of organisations. Major of the
data breach may occur due to the attack causing lose of important credentials and even may
lead to financial damage of the smaller organisations. The following report discusses about
the major type of distributed denial of service attacks that may occur in real world with
detailed study of the operation process of the attack.
Operation of the attack in the real world:
A Distributed denial of service attack may look like many of the other non-malicious
attacks that may lead to availability issues such as slowed down servers or systems or even
may lead to cutting down of cables. The application layer of the ddos attack is meant for
Contemporary Cyber Security Issues_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Distributed Denial of Service (DDoS) Attack: An Overview and Real World Example
|10
|2158
|245

Contemporary World Application 2022
|10
|541
|10

Hackers Without Borders: A Legal Response
|11
|2715
|251

Network System Attacks Course 2022
|7
|1310
|21

Computer Security: DDoS Attacks
|11
|2444
|233

Network Security Analysis: Cyber Security
|10
|1925
|30