Evaluating A Denial Of Service (Dos) Incident

Improved Essays
The best way to evaluate a denial of service (DoS) incident is to base it on the incident analysis that was previously done. From the analysis we had gathered valuable information and this is my evaluation. After getting complaints that the network was running slow I immediately started to do an incident analysis to find out what was happening (Tipton & Frause 2007). So, I decided to use the National Institute of Standards and Technology methodology to seek the answers. Using the Detection and Analysis step I started checking activities on the network and I came to realize that we are the victim of a denial of service attack. In other words someone was maliciously doing things to slow down our network. I discovered that several rules

Related Documents

  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Answer these questions based on the rules What would you do if someone threatened to DDoS/DoS the server: I would mute or either ban them. Threatening to DDos is a bannable or mutable offence! What would you do if you caught someone x-raying and they admitted it: I would give them a reduced ban for admitting and giving me less time to SS!…

    • 637 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Both firewalls and intrusion detection systems are used to monitor network traffic and implement network security policies. Research these technologies and determine how they are similar and how they differ. Are both needed? Explain your answer in a short paper.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    9/11 Attack Case Study

    • 238 Words
    • 1 Pages

    Frequently when responding to an event, first responders are not there for a prolonged period of time. For example: Firefighters are usually fighting a fire for 30 minutes to an hour. However, during the event of the WTC attack, that was not the case. First responders were on-site of hours or even days, those that had PPE found that specific items were hindering them from doing their jobs. According to Jackson et al.…

    • 238 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    2) Network traffic shows that hundreds of hosts are constantly sending only SYN packets to a single Web server on campus. a. This type of traffic suggests a SYN flood attack, which according to Techtarget (http://searchsecurity.techtarget.com/definition/SYN-flooding) is when half-open connections are attempted by the user only sending SYN packets. The server will respond with SYN/ACK packets (on open ports), but the client ignores them and re-sends SYN packets. This means the server cannot handle legitimate traffic when needed. Similar to #1 above, IDS and IPS devices can detect all of this traffic and an IPS can drop the packets before they get to the target server after the pattern is recognized as an attack.…

    • 1074 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Since 2001, the United States special operations forces have been fighting the war on terror. It remains the longest war in American history. The decision to go to war with Iraq was unpopular with the American people, and for those who supported it in congress faced a political backlash. The president received authorization from Congress to declare war on Iraq due to their alleged involvement in the Sep 11 attack and their alleged possession of Weapons of Mass Destructions. On May 19, 2003, President George W. Bush addresses the nation from the Oval Office announcing the beginning of Operation Iraqi Freedom.…

    • 1079 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Answer. Yes, Target story does indeed follow the general “ATP kill chain” attack model as clearly elaborated upon in the case study. Attackers started by performing“Reconnaissance”over one of Target’s external heating and ventilation providers, Fazio Mechanical Servicesprobably after prior deep investigation to detectan easy loophole to infiltrate Target’s network for its malicious objectives. Also,Fazio relied onfree version of a security software called, “Malwarebytes Anti-Malware”, whose license explicitly prohibited corporate use; which is a fineexample of Overreliance on knowledge versus intelligence.…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Question #1: What would be your response to the order? Explain in detail. My first response towards the operation order is to question the necessity of forcefully removing local evacuee from their homes and destroying their property if they refuse to evacuate. Then explain to the commander that this type of action is prohibited and in clear violation of the Law of War. My second response will be to advice that the operation order be revised before the execution of the order because the destruction of civilian property unnecessary and cannot be justified under military necessity.…

    • 686 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    A Broken System Perry B Keaton Case Study - 1 Instructor: Ryan Wentworth October 12, 2015 A Broken System-1 Many filled that the two crucial incidents that occurred in our history could have been avoided if we had paid attention to the warning signs. Are the national systems that we are using the blame for these occurrences? There are so many questions that need to be answer to why the following g disaster had to happen. I am speaking in reference to the Pearl Harbor Attack and 9/11.…

    • 378 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    On April 16, 2007 a student at Virginia Tech murdered and injured a large number of fellow students and faculty. Prior to the incident, he had displayed signs of violent thoughts and behavior to his instructors. As a younger child, he had also been troubled. However, at that age, he had received psychiatric help due to his parents’ involvement (Virginia Tech Review Panel). It is possible that if he had received help as an adult, this crisis could have been avoided.…

    • 324 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Denial-Of-Service Attack

    • 756 Words
    • 4 Pages

    “Denial-of-Service attacks are the cyber equivalent of vandalism. Rather than seek to break into the target system, the perpetrator simply wishes to render the target system unusable” (Easttom, Taylor, 2011). This type of cybercrime prevents the end users from attaining the resource accessibility. Denial-of-Service is also known as a DOS. An attack was launched in Santa Cruz County website in California that caused “county’s government entities and programs, including Emergency Services, Law Enforcement, the Courts, Social Services, Agricultural Extension, Employment, Surplus Sales, Vendor Registration, and Construction Projects and Proposals”( U.S. Attorney’s Office,2011).…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    The DNS is a worldwide distributed directory service, and as such, is an indispensable part of the functioning internet (Hurter, 2011). The final tool we covered was traceroute, used for computer network diagnostics by displaying the path taken and measuring transit delays in packets across an IP network. Traceroute can be used to help identify incorrect routing table definitions or a firewall which may be blocking ICMP traffic, or high port UDP. It is also used by penetration testers to gather information about network infrastructure and IP ranges around a given host (Mahajan, Spring, Wetherall, & Anderson,…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    (Written by James R; not part of the actual report) The website assigned to our group was a ‘government department’ website, so we have chosen to the the Ministry of Justice website. This document is a summary of what our group has currently and collectively thought about the Ministry of Justice website. The writing in this summary report is not considered final, and is under discussion and refinement by the group. Topics covered in the report include the target audience and website appeal to the target audience, page layout, browser compatibility, navigation, use of colour and graphics, multimedia, content presentation, functionality, and accessibility.…

    • 1799 Words
    • 8 Pages
    Great Essays