Sign In
Not register? Register Now!
Pages:
13 pages/β‰ˆ3575 words
Sources:
Check Instructions
Style:
APA
Subject:
Creative Writing
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 52.65
Topic:

Determining Interventions to Prevent DDoS Attacks

Essay Instructions:

Your final assignment is where you will weave the first two elements (the Cyber White Paper and Cyber Research Proposal) together, and incorporate your research analysis, to create a coherent issue paper that is 13-15 pages in length. While it is inappropriate (not to mention a violation of university policy) to cut-and-paste from past assignments in old courses into new ones, this research project is evolutionary and builds itself up from a research proposal to a completed product. For this reason, in this class it is permissible to paste the information (as appropriate and as it makes sense) from the first two assignments assigned in this course into your final assignment.

Essay Sample Content Preview:


INTL 647 - Cyber Issue Paper
Deonte Allen
American Military University
INTL 647: Cyber Intelligence
July 5, 2021
INTL 647 - CYBER ISSUE PAPER
Introduction 
The distributed denial-of-service (DDoS) is a form of denial-of-service (DoS) attack that disrupts the network traffic or victim's computer overload where there is an overload of the requested information flows. Computers launch repeated attacks and they target knocking out our company's servers and computers, which makes it difficult and impossible to access services via the Internet There has been increased launch of DDoS attacks where users, including clients who cannot access websites and there, is overuse of the result of the resources. Typically, too many requests, slowdown services, but the DDoS attacks go further to stop services through the use of multiple devices that agree to execute the attack at the same time. Various flooding techniques are used to overwhelm computer resources mostly through botnets, which are connected computers that are infected and target the victim(s) simultaneously. There are cases of users inadvertently being involved where there are zombie computers used for denial-of-service attacks. Hackers also work closely together in launching DDoS attacks and gaining control over the victims’ computers. 
Research question 
* What interventions are adequate to prevent and protects against DDoS attacks?
Background 
Increasingly, there are more threats from attackers and hackers using different strategies to compromise computer systems, servers, cloud computing, and networks. It is expected that organizations implement internet and computer system security control, but are more sophisticated attackers who can coordinate large-scale attacks using many systems and networks. DDoS attacks flood sources with traffic, and they are different ways that they deny the use of services. For instance, there is the saturation of the systems such that requests remain incomplete there is the exploitation of vulnerabilities. DDoS attacks are a concern as they can go on for a long time and seriously affect the computer system including different servers and devices connected to a network. Even as only a small share of attacks is meant to steal and change data, they do damage organizations and can potentially cause huge losses. Sometimes the attacks are a test for bigger attacks such as the ransomware types of attacks.
Improving security is essential to ensure that services or applications are still available. However, the attacks may also target shared infrastructure that is not well protected, but there is recognition of the need to detect DDoS attacks(s) before there is widespread damage. Improving network security helps to protect the system integrity, architecture data, information, and network. Identifying the intruders and analyzing the traffic patterns are helpful to improve security. In addition, to avoid and prevent DDoS attacks, there is the identification of suspicious flows to prevent malicious packets from attackers. To ensure there is a secure system, there should be a focus on confidentiality, integrity, and availability of the assets and information by authorized users.
 Purpose st...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples: