Friday, June 14, 2019
Systems Security IT Assignment Example | Topics and Well Written Essays - 2000 words - 1
Systems Security IT - Assignment ExampleMoreover, Trojan is operational by initiating an Internet Relay Chat (IRC) that waits for any action from the hacker who has full manoeuvre over the botnet (Rapoza, 2008). Apart from IRC, hackers utilize root kits to compromise weak system with no updated security patches and have security loop holes that facilitate hackers objectives. As there argon countless computers connected to the Internet, they use tools to capture and identify vulnerable systems and uses IP spoofing for (Spoofing.2011) manipulating the original IP addresses for gaining access in to the system. Furthermore, these compromised systems are from different geographical locations, it is difficult to identity suspicious traffic, as it represents different time zones. As botnets are considered as a major player in a Denial of Service attacks, it can be prevented by honey pots and bastion hosts that will identify suspicious broadcast at the initial level.As mentioned previously, that a zombie army initiates flooding and broadcasting attacks from various locations to the specific target. The characteristic of this attack encompasses threats from distributed source and is known as distributed denial of service attacks (DDoS). computing machine network encyclopedia describes it, as the incorporation of hundreds or even thousands of computers that were previously compromised used for transmitting huge volume of unwanted traffic to the target. DDoS attacks are considered to be lethal in the world of Internet has imposes significant risks for businesses, governmental organizations, army networks etc. (Ghazali & Hassan, 2011) research on DDoS attacks has revealed vulnerabilities not only in the network computer architecture or infrastructure, but also in the protocol specifications along with Internet. Exhibit 1.1 demonstrates types of flooding DDoS attacks along with protocolsHigh rate flood attacks This type of attack is achieved by traffic generation from man y machines that may be in total of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.