Monitoring the type of DDoS attack, the frequency of the attack, duration of attack, and the aggressiveness of the attack all provide clues as to whom may be instituting the attack. The packet stream can be disrupted by the victim by 'pretending' to go offline to the protocol receiving the bandwidth from that particular attack. The rerouting of using available bandwidth to other protocols via an alternative port can remove the ramifications of the attack.
Applying the aforementioned framework within the cloud environment offers an unprecedented level of security enabling the transmission and storage of information in an environment where DDoS is actively monitored and attacks are recognizable. The strategy of using the cloud ostensibly removes the bottleneck constriction due to the lack of physical infrastructure such as a server that purports a chokepoint should an attacker stream an abundance of packet information to the target server.
According to Koutepas,…… [Read More]
Detecting, Preventing or Mitigating Distributed Dos (DDOS) Attacks
The Internet continues to be a critical subject due to the increasing attacks based on the major universal communication infrastructures. This study identifies the one detection and two mitigation approaches in developing content to show that DDoS are becoming common in daily business operations.
ationale for selecting the papers
The first research paper I selected is titled "Mitigating Dos Attacks Using Performance Model-Driven Adaptive Algorithms" by Barna and others. The article is recent and goes in length in elucidating the most invaluable method of mitigating DDoS. I also selected this article because it goes in lengths showing how DDoS affects the operations of an organization warranting the adoption of succinct measures in case of an attack.
I also selected an article by ahmani, Sahli, and Kamoun, titled "Distributed Denial-Of-Service Attack Detection Scheme-Based Joint-Entropy" as it elucidates clearly the best way of detecting…… [Read More]
Auditing, Monitoring, and Detecting of Dos or DDoS Attacks
A Dos (denial of service attack) is an attempt to make network or machine resources non-available to legitimate users. Attackers use the Dos to accomplish their goals by flooding the target resources or machines with the superfluous requests or useless packets to overload the systems and prevent users to fulfill their legitimate requests. When Dos originates from a single network or host node, it is termed a Dos attack, however, a distributed Dos is a more serious attack that attempts to consume computer resources to prevent the system from providing services. A DDoS occurs when there are multiple sources of attacks and often come from thousands of unique IP addresses. However, the rates of the DDoS have increased in the last few years, and criminals target high profile servers such as credit card payment gateways, banks other big corporations to achieve…… [Read More]
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks concentrate on rendering any resource (i.e., site, server, or application) inaccessible for whichever function it was created for. There are numerous means for making services inaccessible to their legitimate customers, including manipulation of network packets, resource handling, programming, or logical vulnerabilities. When services receive several requests, they may become unavailable for legitimate customers. Likewise, services can also stop due to exploitation of programming vulnerability, or how the service manages the resources it utilizes. The attacker may, at times, inject and effect arbitrary code when carrying out DoS attacks for accessing key data or executing server commands. DoS attacks considerably damage the service quality, negatively affecting legitimate customers experience. They give rise to significant delays in response, service disruptions, and huge losses, thereby directly affecting the availability of service (OWASP, 2015). This form of cyber-attack attempts to make a certain target service inaccessible for…… [Read More]
Detecting, Preventing and Mitigating Dos or DDOS Attacks
Detecting, Preventing and mitigating DoS or distributed Dos Attacks
Distributed Denial of Services is constantly evolving from small megabits to massive megabits of data. Many Internet Service providers lack the capacity and the ability to mitigate this problem. Most of these attacks are run from one master station that takes control of millions or many stations and use them as Zombies to launch the attack. This paper uses ideas from peer-reviewed articles to summarize aspects related to detection, prevention, and mitigation of DoS attacks.
ationale of selecting the papers
The first research paper selected by Kompella, Singh, and Varghese (2007)is titled "On Scallable Attack Detection in the network" from IEEE/ACM Transactions on Networking Journal. I selected this research paper because it showed a significant research on the current issue of denial of service. The research paper also contains knowledge that captures researcher's…… [Read More]
" (Muntenu, 2004)
According to Muntenu (2004) "It is almost impossible for a security analyst with only technical background to quantify security risk for intangible assets. He can perform a quantitative or qualitative evaluation using dedicated software to improve the security of the information systems, but not a complete risk assessment for the whole information system. Qualitative assessment based on questionnaires use in fact statistical quantitative methods to obtain results. Statistical estimation represents the basis for quantitative models." Muntenu states conclusion that in each of these approaches the "moral hazard of the analyst has influence on the results because human nature is subjective. He must use a sliding window approach according to business and information systems features, balancing from qualitative to quantitative assessment." (2004) qualitative study of information systems security is reported in a study conducted in U.S. academic institutions in the work of Steffani a. urd, Principal Investigator for…… [Read More]
Estonia Cyber Attacks 2007
2007 Estonian Cyber-war
This is the information age. In this age, the Internet has smoothened the progress of spectacular increases in global interconnectivity and communication. This form of globalization also yielded benefits for Estonia by improving the standard of living of its people. However, other than benefits, it has also ascended the availability of new weapons of confrontation for groups who have been seeking and opposing certain Estonian political measures and ideologies. The digital activists from the ussian land did the same to Estonia in May 2007 (Herzog, 2011).
More than 340,000 ethnic ussians reside in Estonia which means that the ussians comprise about 25% of the country's populace. Estonia gained independence from the Soviet Union in 1991. Since then, the small country has been experiencing an unsteady and shaky relationship with Moscow (Lake, 2011, p. A11). Thus, Estonia and ussia share an extensive history of…… [Read More]
Social Engineering as it Applies to Information Systems Security
The research takes into account several aspects that better create an overview of the term and the impact it has on security systems. In this sense, the first part of the analysis reviews the concept of social engineering and the aspects it entails. Secondly, it provides a series of cases that were influenced by social engineering and the effects each had on the wider picture of information security. Thirdly, the research looks at what policies are set in place to avoid this type of practice and how has the information security society responded to the threat posed by social engineering. Finally, possible solutions to the issues social engineering raises are also presented in the context of the increased technological environment in which business is conducted in the world we live in today.
General aspects on social engineering
A non-academic definition of…… [Read More]
Cloud Computing Security Pros & Cons
Over the last ten years, cloud computing has rapidly grown and it is expected to grow even further as more businesses move online. When cloud computing was first conceived, many skeptics dismissed it as being just another tech fad that will quickly disappear. However, over the last three years cloud computing has truly changed the way we think about IT nowadays. The Cloud has significantly reduced the cost of doing business and has allowed businesses to focus on their core activities and not IT related issues (Krutz & Vines, 2010; Ali, Khan &Vasilakos, 2015). These reasons and many other which we will highlight in this essay show that Cloud computing is here to stay. However, like any other technology, cloud computing has also been associated with a few challenges and inefficiencies. This paper will look at the pros and cons of cloud computing. In…… [Read More]
(%) Cross Site Scripting (XSS) errors -- by far the most common strategy hackers use to gain access to the source code of websites and the databases supporting them is to use a technique called cross-site scripting (Brodkin, 2007). Actively monitoring the percentage of XSS errors over time can determine patterns of when hackers attempt to gain access to a website's source code, database links, pricing and e-commerce systems. This is one of the most often used metrics in security dashboards used for monitoring Web-based applications and multisite installations.
(%) Incidence and Trending of Buffer Overflow Injection Flaws -- This is most commonly associated with attempts to gain access to SQL databases supporting a website by forcing a buffer overflow condition (Brodkin, 2007). This is one of the most effective hacking strategies there are as it forces a system to fail and allow access.
(%) Authentication Soft and Hard Errors…… [Read More]
Workplace is not safe from numerous types of crimes. These crimes can range anywhere from burglary to homicides and from discrimination on the basis of sex to even rape for that matter. But these crimes are physical crimes and it is easy to avoid them or keep them at bay by making use of physical barriers, security cameras and a few sensible risk/security management tactics. For instance, if only 3 or 4 people work at night-time, it is easy to target anyone of them but if a considerable amount of people work together and have no hostility towards each other, these types of situations can be avoided. Use of security systems is a pre-requisite for the protection of material wealth and belongings. These types of systems can help avoid theft and burglary but if somehow these do occur, it will inform the managers of the incident at the earliest…… [Read More]
Network Security Systems for Accounting Firm
In the contemporary IT environment, the implementation of the IT tools has become an effective strategy that organizations employ to achieve competitive market advantages. In other words, the IT tools have become an effective strategy that organizations can employ to be ahead of competitors, and be first in the market. One of the crucial features of the information systems is the network connectivity that involves connecting global computer resources, which assist in enhancing effective communication systems. Thus, the network connectivity will improve the communication system for our accounting firm assisting our organization to serve the customer better.
Despite benefits that network connectivity will provide to our organization, the network connectivity is associated with inherent risks and vulnerabilities. Typically, the network systems face different vulnerabilities that include virus attacks, electronic fraud, attacks from malware, Dos attacks and electronic eavesdropping. Since our organization will…… [Read More]
cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public.
In completing a dissertation, it is very hard to go through the challenges that it requires. From the start and until this moment, I had gone through many challenging stages. The challenges that I faced were deciding the topic, reading various journals and articles, narrowing down focus within a large area, getting information on cloud computing, which all required time and effort. Despite the strong tasks that I faced, I finally made it and the 'final product' is about to be released. I feel extremely happy to have this chance to learn through the process since…… [Read More]
How the threats are detected
Ever since the September 11, 2001 terrorist attacks, businesses have had to critically rethink on the level of adequacy of their disaster recovery arrangements in relation to their business continuity plans as noted by Lam (2002,p.19). The September 11, 2001 tragedy effectively highlighted the importance for organizations to continue with their commercial operations even under the most exceptional of circumstance. My business which has a considerable e-commerce operation is particularly vulnerable to the IT related threats. It is therefore crucial that these threats be identified and eliminated or mitigated before they result to loss of revenue.
In my business, I face several threats. However, the ones that I consider most dominant are technology threats and information threats. These threats can cause a major disruption to the to business continuity planning (BCP) cycle. Technology threats include natural disasters like fire and flooding,…… [Read More]
Business Impact Analysis
The heart of any major business, beyond its human capital, is usually its technological resources and status. A business that relies on internet access and an arsenal of computer hardware and software must collect and harness the necessary knowledge, people and tools to manage this technology in an efficient yet effective way. Doing otherwise can expose trade secrets and customer data. Loss of productivity can also be exceedingly damaging.
Mission Critical Functions
As it relates to technology, there are three major functions that are mission critical. The first, and most important, is the network itself. If the network goes down, any networking and Internet functions will grind to a halt. Having such a happenstance drag on for a considerable amount of time can cause massive amounts of damage in terms of client deliverables not being provided and necessary administration work not getting done. It is true that…… [Read More]
Cyber terrorism is the process of using disruptive, electronic activities to disrupt or destroy computers or computer networks with the aim of causing further damage or fear. Cyber terrorism is therefore a very great threat to information as it can lead to the leaking, damage or loss of very critical information by countries. In any case, cyber terrorism is facilitated through hacking and other activities aimed at affecting information across the world Verton, 2003.
Therefore as a threat, cyber terrorism involves terrorists using information technology in order to further their evil causes. The present technological world offers terrorists the opportunity to use information technology to make electronic threats through hackings, introduction of viruses defacing websites and Denial-of-service attacks.
Evolution of cyber terrorism
The evolution of cyber terrorism has basically grown in tandem with the developments realized in information technology. The initial threats began in the 1980s and continue as terrorists…… [Read More]
Vulnerable Areas of Industrial Security Operations:
Industrial security has become one of the most important aspects in the business world because of the need to protect the business' assets and enhance productivity. The need for industrial security is also fueled by the growth of the industrial sector that is constantly changing. The backbone of the every industrial environment or sector is security because of the vulnerable areas within these sectors. Some of the threats that a business is likely to face in industrial operations include sabotage, espionage, competition, utility industry security issues, and transportation challenges.
The banking sector is one of the industries that are likely to experience several vulnerabilities in the operations of the banks. As one of the major players in the American banking industry, Bank of America has some vulnerable areas. First, the financial institution is likely to experience espionage, which involves technical means and attempts by…… [Read More]
Metrics, Implementation, and Enforcement (Security Governance)
How can you determine whether there has been a malware outbreak?
The threat situation today has become more dangerous than in the past. Security and safety threats have been increasing in an alarming rate; there are more than 70,000 brand new bits of malware recognized daily. Well-funded cybercriminals have been currently making advanced malware that has been made to bypass present security options by launching prior to the operating-system and then evading antivirus defence (Mitre, 2012). Consequently, danger vulnerability has hit unprecedented degrees that need a brand new method of security and safety. With built-in security and safety options from McAfee as well as Intel, one might gain an additional layer of safety that is effective aside from the operating-system to avoid attacks instantly whilst successfully managing security over to a system of endpoints. These revolutionary options gather world-class processor chip technologies from Intel…… [Read More]
Intrusion detection is the method of keeping track of the events taking place inside a computer or perhaps a network and then examining them to get indications of potential situations, that are transgressions or impending dangers of breach of IT security procedures, appropriate usage guidelines, or standardized security strategies. Intrusion prevention is the method of carrying out intrusion detection as well as trying to stop recognized potential situations. Intrusion detection as well as prevention systems (IDPS) happen to be mainly centered on determining potential situations, writing down details about them, trying to end all of them, as well as reporting these to security managers. Additionally, businesses make use of IDPSs for various other objectives, like identifying issues with security guidelines, documenting current risks, as well as stopping people from breaking safety guidelines. IDPSs have grown to be an essential accessory for the security system involving just about any…… [Read More]
arfare & Terrorism
The proliferation of cyberattacks -- aptly referred to as cyberterrorism -- carried out by criminal miscreants with grudges, shadowy techies with political motives, and other anti-social individuals, represent the new digital wars that threatened personal and state security worldwide. This is not a problem that will go away any time soon, and cyber security officials it seems will always be one or two steps behind the offenders causing the digital carnage. The cyberattacks that are reviewed in this paper include: Russia's denial-of-service attacks on Estonia in 2007 and Georgia in 2008, and the cyberattacks against U.S. State Department computers in 2006. Denial of service refers to strategies that "…block access of legitimate users" through the "…relentless transmission of irrelevant information" -- called "flood attacks" -- which restrains computer servers (Richards, 2010).
Russia's cyberterrorism against Estonia -- 2007
An article in the International Affairs Review indicates that the…… [Read More]
Corporate fraud as a dishonest activity for organizations that is considered as white collar crime has serious legal implications. Though it can be difficult to detect and catch, it is important to prevent it by creating effective and efficient policies for the organizations that ensure an efficient system of checks and balances exists in the organization for its physical and fiscal security. Whenever fraud happens in a company or organization, it often takes the form of hiding sources of revenue, overstating expenses or growth, or disguising payments made to individuals in the company. Often, fraudulent activities within the organization are complex in nature and have a gross impact on the financial nature of the organization. It is usually perpetrated by the company management and other employees are often unaware of these fraudulent activities (Mele, 2005).
Corporate fraud, as difficult as it is to prevent, often has a ripple effect whereby…… [Read More]
Privacy and security is a major concern for any person in the technological era that we are living in today. Everything today is revolving around technology in some aspect. Our academic career, professional life and even personal lives are affected by technology. Because of social media, people are likely to put very personal details and images on the World Wide Web. When people are not reluctant about uploading their personal information online, they also wouldn't have any problem uploading their financial and company relations.
Social media websites like LinkedIn, Facebook and twitter is affecting the way people interact with each other on the global scale. They are also affecting the way company's brand, advertise and even distribute their products (Edosomwan et.al, 2011) It has been stated that majority of the companies and corporations are receptive to online collaboration tools and social media. Nonetheless, when it comes to information technology, there…… [Read More]
Chef Delivery is a continuous and unified delivery service that provides enterprise DevOps teams with a new workflow framework in which they can better manage the continuous delivery of their infrastructure. In sum, Chef Delivery automates changes to infrastructure, runtime environments and applications, but it provides a useful framework in which automated testing and continuous integration and delivery can be achieved. In addition, Chef Delivery provides software developers with relevant metrics, permissions management and a comprehensive change history for their code.
The system is built for infrastructure, containers, and applications and is geared toward Fortune 2000 companies and is intended to help IT teams become a ?high-velocity development engine."
Chef Delivery further extends Chef Inc. into the DevOps market and automates changes to runtime environments, applications, and infrastructure. In addition Chef Delivery offers a framework for automated testing and continuous integration and delivery with tools such as Jenkins
Chef Delivery…… [Read More]
Cyber Attacks on Financial Institutions
The finance industry has continued to receive more targeted and sophisticated cyber attacks from criminals. These criminals often email phishing campaigns to customers which have remained the most successful methods of targeting financial institutions. New innovations in banking, like online and mobile banking, have continued to create new vulnerabilities for cyber thieves. To minimize the efficiency of these attacks, banks have devised improved communication and educational tools for customers, and procedures for quick interventions in the event of an actual attack. However, beyond simply creating harmful software intended to hack online bank details, criminals have found ways to subvert the software and servers owned by prestigious financial institutions to make their phishing campaigns more effective; this technique is known as infrastructure hijacking (Pettersson, 2012).
In 1998, one of the foremost examples of infrastructure hijacking ever discovered is known as The Morris worm. This…… [Read More]
Kris Corporation's parent domain (kris.local) and child domain (corp.kris.local) for the organization's AD infrastructure are running on Server 2008. The following are concerns related to AD: (1) Kris Corporation is concerned about running multiple domains, and (2) automobile manufacturers are asking Kris Corporation to use a single identity to procure orders in real time. The company has five locations in Atlanta (GA), Baltimore (MD), Chicago (IL), Seattle (WA) and San Diego (CA). The manufacturing plants are in Atlanta and Seattle. Disaster recovery is a big concern. Physical space for servers is an issue at the Atlanta location. Most of the IT staff is in Atlanta, which is the company's headquarters, but other locations have significant IT personnel as well. Business personnel are similarly distributed across the company's locations. Since all locations are independently connected to the internet, file sharing is difficult among sites.
Kris Corporation needs to migrate from…… [Read More]
Abstract - With regard to security, the major issue is that most mobile devices are targets that are in line to face attacks. Mobile devices face a range of threats that capitalize on several susceptibilities usually obtained in such devices. Lack of encryptions is a major threat to security of mobile device networks. Information such as text messages and electronic messages that are sent using a mobile device are more often than not unencrypted. Furthermore, numerous mobile device applications lack such encryptions over the networks for transmission and reception and therefore simplify the process of data interception. Malware is an additional problem regarding mobile device networks. It is simple for mobile device users to download malware through games and security patches and also through online advertisements. Consequently, this makes it significantly easy for data interception owing to spyware and Trojans. The lack of security software is also a major issue.…… [Read More]
The five-factor model is a classification system of personality traits organized in five broad dimensions i.e. openness to experience, conscientiousness, extraversion, agreeableness, and neuroticism. The model was derived from factor analytic studies of a large number of existing measures on personality traits, and has been established as generalizable across cultures (McCrae & Costa, 1997; McCrae & Costa, 1999; McCrae & John, 1992).
The leadership should reflect extra-version; this dimension represents the leader to be optimistic, assertive, and sociable. The leader should serve as intervening means of transmission, expression, or communication. Extraverted leaders are capable of exercising their influence in an assertive manner to communicate in an effective method.
The leadership requires the individuals to be disciplined, organized, and persistent. The leader should watch over or guard against carelessness, laziness and inefficiency. Conscientious leaders are consistently methodical, responsible, and thorough in their decision-making and activities.
Leaders are…… [Read More]
However, nothing can be done until the malware actually occurs. With all the different viruses, worms and Trojans, how can security managers possibly predict what malware will occur next? In contrast, a behavioral rule defines legitimate activity in a system. Any activity not matching the profile will cause the security product to be triggered. As rules are not specific to a particular type of attack, they can block malicious behavior without having to recognize the precise attack used. Thus, there is additional protection against new attacks as they emerge. It is to effectively prevent any unauthorized applications, including malicious code and Trojans. or, it could protect a webserver by making it impossible for anyone to access the webserver to change the files and limiting the risk of a hack (Franklin, 2002).
However, the dilemma comes how many rules should the system have? The security manager must decide between an effective…… [Read More]