1INFORMATION SECURITY Abstract 04 Topic: Denial of service and distributed denial of service attacks The leading intention of the paper is to address the security steps which can be very much important to address the risks coming from security threats such as DoS as well as DDoS. The paper will be very much valuable for the readers of this document to understand the current and the future trends of these security attacks. Based upon the analysis, security plans can be adopted in both business organizations as well as in our society. The analysis of these two security threats will be conducted in a professional manner so that the exact security goals are adopted to mitigate these security threats in order to maintain a secure computing environment. The cryptographic algorithm which can address these security threats such as the Public Key Cryptography (Yan & Yu, 2015). The importance of maintaining the security policies which will deal with security threats like DDoS will be also discussed in the paper as well. The flaws in the different types of operating systems will be also discussed in the paper as they are also responsible for security issues such as DoS and DDoS. The importance of the authentication procedure in order to contain or mitigate security flaws will be also discussed in an organized manner (Yan et al., 2016). The paper will also be very much helpful to understand the access control mechanism required to contain the DDoS threats in both public places as well as in business organizations. The IT security polices which will be very much to mitigate the threats coming from the social engineers of the DDoS attack will be also discussed in the paper in a professional manner.
2INFORMATION SECURITY Reference Yan,Q.,&Yu,F.R.(2015).Distributeddenialofserviceattacksinsoftware-defined networking with cloud computing.IEEE Communications Magazine,53(4), 52-59. Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges.IEEE Communications Surveys & Tutorials,18(1), 602-622.