Professional Documents
Culture Documents
Assignment Part 2 Done
Assignment Part 2 Done
A DoS occur when a service that usually should be available turns out to be
inaccessible. There can be plenty of causes for this non-availability, but it usually
happens because of management issues and work demand more than the capacity of a
system.
The DoS attack that is explained here is related to Distributed Denial of Service
(DDoS) that happens because of various groups of systems attacking single target. This is
usually settled through a Botnet, in which multiple devices are working to demand a
service at the same time.
As compared to other events like hacking or brute-force attacks, Denial of Service does
not break security rules and does not leak out the information. But still the image of the
company gets affected and causes a loss of large amount of money and time. Many of the
customer try to move to any other service provider because of the future security
concerns. A DoS attack causes an outbreak of blackmailers and activists affecting it. This
is the kind of situation companies never want to go through.
● Continue to monitor the networking packets and the nature of data that go
● Regularly update the data and software that are currently available and
attack.
● Send a detail report of the event to service care provider and ask them for
help.
● Hosting planners
● Security service
One of the most important decisions is that is required to be made immediately is what is the
point of actual response to attack. Agencies do not want to cope with the situation like other
security issues. The situation is related to focus on the availability it should be reviewed as a
disaster management rather than an issue of security breach.
If there are separate teams for disaster management and security issues, then handling out the
attack to a different team can cause a loss of precious time. Denial of service is considered as
human-made attack that affects the performance at a large level.
● A disastrous response
It is mandatory to identify the type of attack prior to generation of response. The type of traffic
approaching the system should be analyzed first rather than the influence of that traffic. If
information technology staff is unable to recognize the resources of attack and turn out to be
offline, the attack has been successful and vital time duration of response has been lost.
It is necessary to identify the source of fake traffic. Previous list of IP addresses and known
malicious sources can help, which helps in tracking the record of previous unknown attacks.
Attacking resources can be made online within no time and transferred to other sources quickly,
completely hiding the root cause of the attack. Identification of proper source of attack requires a
complete and accurate information regarding all the techniques and tools.
The level of understanding about the hacking source is related to intelligence. The higher scale of
intelligence is better, but it is not sufficient unless there are resources for analysis and
knowledge.
When there are minimum chances to avoid the DoS, DDoS attack, companies set up a
prior management plan to reduce the chances of being attacked or minimize the severity of
attack.
● Get the company included in the DoS safety services in order to recognize the
malicious traffic and rearrange their direction opposite to your network panels.
Filters can be inserted to remove the traffic that seems to come from unknown
source.
It is also an important aspect to make secure connection with all devices and make the system
more reliable.
● Antivirus software should be installed in the system and continuously update it.
● Install a firewall system that acts as filter and minimizes the traffic coming towards your
network.
● Regularly analyze the modern security services and update your security systems
according to the requirements. Follow proper security practices to reduce the unnecessary
traffic.
The signs appear as an unknown non-availability issue. It can be like a technical issue or
an IT administrator performing maintenance of the system. The symptoms that are
specific to Dos or DDoS attack are:
The proper technique to identify an attack is to regularly monitor the website and perform a
thorough analysis. Traffic can be tracked through a built-in firewall detection system.
There are various popular software that make it difficult to break passwords. Tools like Winhex
are used to make documents cohere in Microsoft office software. It is known by us that
Fortitray.exe contains credentials after a failed or successful login. After that we have to press
Ctrl plus F for opening search in WinHex-Editor software. Now we should enter our password
and press OK. Hopefully, the results we are looking for will be provided. But we did not get the
result we should press F3 for finding next answer or next result. It is the fact that everything is
not lost in this process (Jamal, 2018, p. 256).
Protection is necessary to protect your data from hackers. Monitoring is the best way to protect
data. It is necessary to have good management and have a good monitoring system, if some
internal threats are present you can know about them very easily. In this case, if you have the
best monitoring system the chances of risks decrease. Be aware of the risks and the internal
threats. By using the best technology and best monitoring system you can stop hackers to hack
and stop them to leak any information.
Demand of forensic labs have been greatly increased in previous few years. So, complete filtered
dictionary with all the user’s passwords that were stored in various web browsers like fox and
chrome etc. To create a text file with passwords, just press Export button and all available
passwords can be assessed by password recovery tool. Another software that immediately extract
stored passwords is Elcomsoft version 3.20. It can extract passwords from enormous number of
emails of clients and various internet browsers. Largest browsers like Yandex browser, UC
browser, Chrome and QQ browser are added with the extraction tools (Tan, 2013, p. 450).
References:
Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spafford, E.H., Sundaram, A. and Zamboni, D., 1997,
Symposium on Security and Privacy (Cat. No. 97CB36097) (pp. 208-223). IEEE.
Okolica, J. and Peterson, G.L., 2011. Extracting the windows clipboard from physical
Carl, G., Kesidis, G., Brooks, R.R. and Rai, S., 2006. Denial-of-service attack-detection
Zhang, H., Cheng, P., Shi, L. and Chen, J., 2015. Optimal denial-of-service attack scheduling
Mahjabin, T., Xiao, Y., Sun, G. and Jiang, W., 2017. A survey of distributed denial-of-service
Jamal, T., Haider, Z., Butt, S.A. and Chohan, A., 2018. Denial of service attack in cooperative
Tan, Z., Jamdagni, A., He, X., Nanda, P. and Liu, R.P., 2013. A system for denial-of-service