Dos Attack Research Paper

Improved Essays
The danger for the average computer user is that someone will hack their system. Most average computer users don’t have anything worth stealing. Now, on the internet, there are other dangers, because your computer could be a launching pad for other attacks. So people might want to break into your computer in order to use it later on as a tool to break into something bigger. These things happen all the time. A lot of DoS (Denial of Service) attacks are based off these types of intrusions. A DoS attack is basically a virtual sit-in in which a hacker uses a computer to send thousands of packets a second at a website or server, flooding it and blocking access to legitimate traffic. Usually a DoS isn’t enough to take down a website, or even a simple home …show more content…
Well, Trojan viruses are RATs, or Remote Administration Tools, which gives the host access to any machine infected, whenever they want access. This includes the ability to log every single key you press, every password you type, and even every credit card number you enter on amazon. Hackers gain access to your bank accounts, personal information, and anything else that you do on your computer. They can blackmail you with personal information in order to get money, sell your credit cards, and hack into your bank accounts all at a few strokes of the keyboard. In 1982 the US found out that the KGB had been stealing our technology and using it. In response, perhaps one of the first Trojan viruses ever created was slipped into a piece of software that the KGB planned to steal. The file they were stealing? A piece of software designed to regulate gas pipelines. 10 million cycles, and a few months later, the Trojan virus triggered. It caused the gas pipeline’s pumps and compressors to run at dangerously high speeds. There was only supposed to be a few leaks in the pipeline, but what ended up happening was an explosion ⅕ the strength of an atomic bomb. The most monumental non-nuclear explosion ever to be seen from

Related Documents

  • Great Essays

    Covert operations to sabotage foreign bomb making efforts are conducted, then the Manhattan Project, which is set up to create the American and British atomic bomb, is begun. Nearly six years of work and many espionage deals later, it is time to perilously test the atomic bomb. Following not even a month after the…

    • 1553 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook (What is a Rootkit Virus?). Owners are able to implement files, monitor what’s being down on the computer and change the systems on the…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Both firewalls and intrusion detection systems are used to monitor network traffic and implement network security policies. Research these technologies and determine how they are similar and how they differ. Are both needed? Explain your answer in a short paper.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The hacker can also gain access to the files saved on the hard drive and share them with others in…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Target Attacker Timeline Date 1: 10/8/2013. (Estimated date) Reconnaissance and scanning: Attackers acquired Fazio Mechanical Firm’s user code and password through a phishing email containing a Trojan called Citadel, a password sniffing bot program. The phished credentials provided access to Target’s payment system network. Extensive reconnaissance and scanning would have been needed in order to identify Fazio Mechanical as a Target vendor, and acquire the emails of employees that possessed the login credentials necessary to access Target’s systems. Date 2: November 11th 2013 (Around 34 days after date 1) Exploitation: Attackers first breach Target’s system.…

    • 591 Words
    • 3 Pages
    Great Essays
  • Great Essays

    Since 2001, the United States special operations forces have been fighting the war on terror. It remains the longest war in American history. The decision to go to war with Iraq was unpopular with the American people, and for those who supported it in congress faced a political backlash. The president received authorization from Congress to declare war on Iraq due to their alleged involvement in the Sep 11 attack and their alleged possession of Weapons of Mass Destructions. On May 19, 2003, President George W. Bush addresses the nation from the Oval Office announcing the beginning of Operation Iraqi Freedom.…

    • 1079 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Although many people believe that the net isn’t a bad thing, the truth is that it is bad in a way,but the net is also good. The net is a thing that allows people focus on things that move and worps our minds. It dulls our sense of awareness to things around us. Such as reading on the net, someone could be so absorbed in their reading that a psychopath could come up behind them and kill them. The net also helps us to remember good times and bad.…

    • 480 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Sadly, terrorism continued to occur almost 60 years later in 2001. Not only did 9/11 occur, but there was a chemical war on America's hands as well. The anthrax attacks occurred shortly after 9/11 in September, eighteen victims of the attacks were identified between October 3 and November 20. This was caused by dried spores of B. anthracis that were sent through letters by the public mail. Five people are known to have died from anthrax and The 2001 Anthrax Deception:…

    • 968 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Question #1: What would be your response to the order? Explain in detail. My first response towards the operation order is to question the necessity of forcefully removing local evacuee from their homes and destroying their property if they refuse to evacuate. Then explain to the commander that this type of action is prohibited and in clear violation of the Law of War. My second response will be to advice that the operation order be revised before the execution of the order because the destruction of civilian property unnecessary and cannot be justified under military necessity.…

    • 686 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Denial-Of-Service Attack

    • 756 Words
    • 4 Pages

    “Denial-of-Service attacks are the cyber equivalent of vandalism. Rather than seek to break into the target system, the perpetrator simply wishes to render the target system unusable” (Easttom, Taylor, 2011). This type of cybercrime prevents the end users from attaining the resource accessibility. Denial-of-Service is also known as a DOS. An attack was launched in Santa Cruz County website in California that caused “county’s government entities and programs, including Emergency Services, Law Enforcement, the Courts, Social Services, Agricultural Extension, Employment, Surplus Sales, Vendor Registration, and Construction Projects and Proposals”( U.S. Attorney’s Office,2011).…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The Internet is a complex group of networks that can be very useful tool for research, and there are some sites use for social media. “The Undercover Parent”, written by Harlan Coben, believes that by spying on teen’s Internet use, through the use of spyware, is a good idea. So should teens have the right to privacy online? Yes, they should have privacy whilst texting and online, here are some reasons why. Teens should be able to speak online without fear of being watched.…

    • 506 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    : In a true act of heroism, Navy Blue Angel pilot died reportedly maneuvering his aircraft away from an apartment building before it crashed. Article: On the same day, two jets from the military's premier flight, demonstration squadrons, the Blue Angels and Thunderbirds, crashed. One pilot survived, but the other died reportedly maneuvering his aircraft away from an apartment building before it crashed. Now some are asking are these elite fighter jets a threat to safety, and should they be allowed to fly over civilian areas?…

    • 625 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The best way to evaluate a denial of service (DoS) incident is to base it on the incident analysis that was previously done. From the analysis we had gathered valuable information and this is my evaluation. After getting complaints that the network was running slow I immediately started to do an incident analysis to find out what was happening (Tipton & Frause 2007). So, I decided to use the National Institute of Standards and Technology methodology to seek the answers.…

    • 337 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Throughout the war the allied powers had tried different approaches at the initial landings on foreign soils, they have been pushed by rail, by air, by sea, and by parachute. Not one had been one hundred percent successful, prior to Operation Husky, the allied powers decided during the Casablanca planning conference that the primary invasion tool would be an amphibious landing with additional paratrooper forces pushed inland the night before, with hopes of knocking out axis pill boxes and defense batteries . The paratroopers dropped during the night of July 9th and into the early morning of the 10th, with the bad weather of winds and rains, the paratrooper invasion was not going to be a big success with the push inland from the beaches .…

    • 1067 Words
    • 5 Pages
    Improved Essays