Free Essay

Denial of Service

In: Computers and Technology

Submitted By Betts8552
Words 699
Pages 3
DoS/DDoS Prevention

This document details guidelines that can be implemented to the school to prevent the recent DDoS attack the school experienced. These guidelines are by no means any requirement, however each will grant an additional layer of security for the current networks and services in production.

Implement Policies and procedures

An Acceptable Use Policy is a policy that defines what type of actions are allowed to be performed on the systems and network to which the policy applies. For the school, an Acceptable Use Policy may state that users of the computers and network must be performing functions related to the school such as homework, administration, research, etc.

In addition to defining what is allowed, the Acceptable Use Policy should also specify what actions will be taken when a user or individual violates the policy. The acceptable use policy should be made accessible to every user. One method to do this would be to display the policy when a user logs in or direct them to where they can read the document. (Glenn, 2003.)

Develop Incident Response Procedures

The incident response procedures should identify the following: ← Define who the respondents are and what each individual's responsibility is ← Specify what data is to be collected and what actions are expected ◦ This would include gathering information on the attacker and a clearly defined resolution path for the team to return systems to a pre-attack state ← Details to when the team should respond ◦ Different systems should be given different priorities depending on their importance. ← How should the team escalate issues when a critical decision is needed to be made? ◦ One method to handle this would be to include a variety of individuals on the team including a key decision maker. (Glenn, 2003.)

Patch Management

All systems has an operating system running on them and vendors for those systems continually release patches when security holes are discovered or new features are implemented. Despite their importance, they can break existing resources or open up new undiscovered security flaws.

It is for these reasons that it is as important to fully test new system patches as it is to get them applied to systems. If possible, patch testing can be done in a virtual environment drastically reducing the number of test machines needed.

A detailed summary of patch testing should be completed and well documented before installing the patches. It may also be beneficial for the patch to be given a second look by another individual before installation. (Glenn, 2003.)
Implement an Audit Schedule

Information systems can and should be audited on a regular basis to check for irregularities, improper configurations, and allow for a time when individuals can critically think about added recommendations that can be implemented.

Information security audits include: ← Reviewing firewall and router ACLs ← Port scanning of firewalls, routers, servers, and other machines ← Performing vulnerability assessments of critical services, computers, and network devices ← Checking users and other access controls ← Analyzing installed software

In the recent attack, if regular audits were performed it is possible that the rogue software could have been detected as well as any network anomalies presented by the software. (Glenn, 2003.)

Implement an Intrusion Detection/Prevention System

An IDS or IPS allows for malicious or strange traffic on the network to be identified and either notify an administrator and even create a firewall rule to put a stop to the traffic.

In the school's case, an IDS or IPS should be placed in front of the network resources of most value if not all network resources. If an IDS or IPS had been in place it would have been possible for an administrator to have been notified the moment the DDoS began. This would facilitate a much quicker response than without the system at all.

In addition, it is possible that other types of traffic could have been detected before the DDoS occurred that would have signaled that some machines may be infected with a foreign software. This would have allowed for the intervention before any malicious act could be performed. (Glenn, 2003.)

References

Glenn, Michael. (August 21, 2003). A Summary of DoS/DDoS Prevention, Monitoring, and Mitigation Techniques in a Service Provider Environment. Retrieved from…...

Similar Documents

Free Essay

Denial Is the Root of All Evil

...Denial Is The Root Of All Evil Corey Gard Professor Standifer Composition I, Argument Essay November 1, 2010 Corey Gard Professor Standifer Composition I, Argument Essay 1 November 2010 Denial Is The Root Of All Evil Row along you rower of sorts, row fast and row slow, row until you can row no more, then row somemore. Row hard enough that your arms fill with cramps and your hair turns white with stress, row until your back pains with your incessant, consistent, ritualistically morbid and mentally dangerous norms. But, row long enough and you will become tired of this ridiculous method of transportation and long for something better, a propellor perhaps to do the rowing for you? And as you sit peacefully behind the wheel of your new vessel, somewhere inside of your newly relaxed mind, ideas emerge, that incredible longing for the different. You may awaken from a restful night of sleep, peer out the window and glimpse this “reality” this life that we have found ourselves with which was built from the backs and necks of our parent’s parents’ parents…etc. and realize many questions that lie just below the surface, these questions of which we are simply unable, until this moment, to ask. Questions like, why exactly is our society does the mighty dollar have the final say? Why are our minds structured by absolutes? (hell no! or hell yes!) Why, even though the idea in itself is morally wrong, do we accept ourselves as part of a Capitalist union? Or even, why we......

Words: 545 - Pages: 3

Premium Essay

Service

...They want to customise a luxury Europe travel package with everything top- notch. They seek your advice on where they should go. In order to provide them with quality customer service and adequate product knowledge, you are to research the following list of criteria: 1. Choose an Europe destination from the list below: * North Europe/ Scandinavian Countries: Norway and Sweden or Denmark or Finland * Western Europe: Great Britain and Ireland, or Netherlands, or France, Germany or Switzerland * Southern Europe: Italy, or Greece, or Spain, or Turkey 2. Capital City 3. Official language 4. Currency with 3 letter- code 5. National Air Carriers with 2 letter- code 6. Weather and climates 7. National Religions & their rituals (creating awareness for potential travellers) 8. Cultural (Expectations, Events, Costume and etc; the do’s and don’ts) 9. Visitor Attractions (List and describe major attractions for each segment.) * Natural/ Landscape (FOUR (04) visitor attractions) * Man- made (FOUR(04) visitor attractions) * Landmark (TWO (02) visitor attractions) Note: Total of TEN (10) visitor attractions to be list & describe. 10. Cuisine (such as French fondue, so forth.) 11. Others (if it is necessary to take note, such as service charge, tipping custom, travel insurance, customs and health regulations, vaccination, or passport and visa requirements) 12. Photo Journal of the country/......

Words: 911 - Pages: 4

Premium Essay

Services

...Services | Home Tuition Class | Common Services | Class ID : 1651 | Class ID : 1652 | Class ID : 1653 | Class ID : 1654 | Class ID : 1655 | Service that was found | Through internet | Through internet | Through internet | Through internet | Through internet | Area covered | Bandar Utama | Seri Kembangan , Serdang | Jalan Ipoh | Cheras | Kelana Jaya , Old Klang Road , Sunway , SS2, Bangsar , Cheras | Subjects Required | Primary 1-6 , Bahasa Malaysia | * Form 1-3 : Science & Mathematics * Form 4-5 : Science , Additional Mathematics , Physics , Chemistry & Biology | Lessons serve children from 4 to 8 years old. * English language& Phonics * Pre reading * Bahasa Malaysia * Science & Mathematics * Handwriting & Printing * History & Social Studies * Tamil Language * Time for fun , Learning | * English * Bahasa Malaysia * Mathematics * Science for standard 1-6 * English for lower secondary * Business * Human Resource * Marketing * Project management & Business – related subjects for college / universities | * UPSR : All subjects standard 1-6 * PMR : Bahasa Malaysia, Mathematics, Science , History * SPM ( Form 4-5) : Bahasa Malaysia , Geography, History , Commerce , Economy * STPM (Form 6) : Bahasa Malaysia , Economics | Duration | 2 hours | 2 hours | 2 hours | 1 hour 30 minutes | 1 hour 30 minutes | Max. no of students | 4 students | 3 students | 4 students | 2 students | 4 students | ......

Words: 2247 - Pages: 9

Free Essay

The Ipremier Company (a): Denial of Service Attack

...Case Analysis The iPremier Company (A): Denial of service Attack Case 2—2 MIS 606- Management Information Systems 4 December 2012 Summary of the problem The case presents a specific problem that has taken place in iPremier, a Seattle based company that was founded in 1996 by two students from Swathmore College and had become one of a few success web-based commerce, selling luxury, rare, and vintage goods over the Internet. It was exactly on January 12, 2007, when iPremier Web servers were brought to a standstill. The Web site of the company was locked up; neither employees nor customers can access the site due to a distrusted denial-of-service (DDoS) hacker attack. At that time, the company CIO, Bob Turley, who was recently hired, was out of the town on a mission, and that made the situation even worse. The problem was soon spread reaching the CEO! The shocking finding was the outdated emergency procedures. Eventually after 75 minutes the problem was solved and the main champion in my opinion was luck! Unstructured actions were taken to overcome this attack. The corrective action was taken but still iPremier will need to come up with preventive action for similar situations because this might threaten its existence. The technology The case discussed different technologies: distributed denial of service (DDoS) attack, firewall, and information security mainly in case of crisis. DDoS is a type of web attack that seeks to disrupt the normal......

Words: 1713 - Pages: 7

Free Essay

Denial Letter

...Denial Letter English Professional Writing ------------------------------------------------- ------------------------------------------------- Hotel of the West ------------------------------------------------- 39115 Trade Center Drive ------------------------------------------------- Palmdale, CA 93551 ------------------------------------------------- E-mail: hotelofthewest@hotelbusiness.com Phone: (888) 555-1234 Jack Preacher Human Resources Manager January 12, 2014 Jeff Clarke Assistant Manager 4567 Trans Way Palmdale, CA 93551 Subject: Request for Emergency Leave Dear Mr. Clarke, I have received your request for emergency leave, dated January 18th through the 19th, for the upcoming weekend. We respect you as an assistant manager, and value the professional dynamic you bring to the workplace. As a family oriented company, we are sympathetic and understand your situation. However, we support the Family Medical Leave Act (FMLA) which states employees are entitled to take leave due to family or medical emergencies under specific reasons. However, taking medical leave to care for an employee’s grandparents does not fall under the FMLA qualifications. In addition, our company policy, section 4, paragraph 5, states that an employee may not take more than one...

Words: 336 - Pages: 2

Free Essay

Tragedy of Denial

...Tragedy of Denial Arthur Miller is considered to be one of the greatest play writers of his times. After many years the themes of his plays can still be compared to our every day life. Miller has written his plays filled with drama, tragedy and leaving the reader feeling the emotion of his characters. Miller has used common themes that can be traced through some of his plays; the theme of family and the extent an individual will go to for their family. In three of his plays, Miller demonstrates tragedy wrapped within denial. The three families portrayed in Millers plays, All My Sons, Death of a Salesman, and A View From The Bridge are families that are consumed with denial to cover up and protect against their own guilt and selfish needs. Each of these families have characters who display such strong denial believing they are doing what is best for their family. However, when taking a closer look, what is reviled is failure and justifications to protect what is best for them selves. In All My Sons by Arthur Miller, the characters forming the Keller family are living in the 1940’s, a time where financial stability seemed out of reach. Joe Keller who is a father, husband, and business owner, is one of the main characters in this play. Joe is able to provide his family with the financial stability he has wanted but at a high cost. With one bad decision, Joe committed a crime that he never thought would affect his family directly. Joe allowed the defective airplane......

Words: 1963 - Pages: 8

Free Essay

League of Denial Report

...The League of Denial is an exposé on the NFL’s handling of medical research on concussions, specifically Chronic Traumatic Encephalopathy (CTE), in the late 1990s and early 2000s. The documentary, put together by investigative reporters Mark Fanairu-Wada and Steve Fanairu, details the different suppression and negligence of the research being done on the effects of concussive hits in football. One of the most telling storylines in the documentary is the one that revolves around Dr. Bennet Omalu and Mike Webster. Mike Webster was a Hall of Famer for the Pittsburgh Steelers during the 1970s. After his career was over, he began to experience a personality change. He was losing his memory, and according to his wife, he started to garner anger issues. Webster died at the age of 50. After Webster’s death, Dr. Bennet Omalu performed an autopsy on him. Omalu examined Webster’s brain, and found it to be severely atrophied. Omalu then began a quest to find the answers on why Webster’s brain was so atrophied. Upon further investigation, Omalu found that this was a recurring disease in athletes who are involved in contact sports (football, wrestling, hockey, etc.). This was the inception of CTE, which is only diagnosable in an autopsy post-mortem. Omalu then brought his evidence to the NFL, which gave him the figurative cold shoulder. They would not take Omalu seriously, and took steps to discredit him. After a long fight, Omalu took a break in trying to convince the......

Words: 304 - Pages: 2

Premium Essay

It Services

...Five Services to Help Grow Your IT Services Business in 2013 — and Beyond ConnectWise.com Introduction 2013 is a year of great opportunity for Managed Service Providers (MSPs). As reported in the Wall Street Journal, IT spending by businesses with fewer than 500 employees is expected to grow by $4 billion to a total of $27.2 billion in 2015.1 The good news does not end there for MSPs. According to a recent study, 89% of MSP clients are “very” or “mostly” satisfied with their providers.2 In fact, a significant majority of clients reported that they intend to increase their IT spending in the next two years. Now is the time to position your company for growth by preparing to meet new and evolving client needs. 3 If you are an MSP seeking to grow or maintain your business in 2013 and beyond, market conditions are such that there will be many opportunities to acquire new clients or expand on the services provided to your existing clients. Your challenge is in differentiating your business from thousands of other providers in the marketplace who share your ambitions. A recent Wall Street Journal article revealed that there are now over 300,000 independent IT consultants and 114,000 small IT services companies providing support to small and mid-sized businesses (SMB).4 There may also be new competitors on the horizon as technology retailers such as Staples, Apple, and Best Buy eye the SMB marketplace and work to develop offerings that will compete with the traditional......

Words: 2822 - Pages: 12

Premium Essay

Service

...Linking perceived service quality and service loyalty: a multi-dimensional perspective Josee Bloemer, Ko de Ruyter, Martin Wetzels. European Journal of Marketing. Bradford: 1999.Vol.33, Iss. 11/12; pg. 1082 » Jump to full text Subjects: Service industries, Studies, Statistical analysis, Quality of service, Market research, Loyalty, Consumer behavior, Effects, Marketing management, Customer relations Classification Codes 9175 Western Europe, 8300 Service industries not elsewhere classified, 5320 Quality control, 7100 Market research, 2400 Public relations, 9130 Experimental/theoretical Locations: Belgium Author(s): Josee Bloemer, Ko de Ruyter, Martin Wetzels Document types: Feature Publication title: European Journal of Marketing. Bradford: 1999. Vol. 33, Iss. 11/12; pg. 1082 Source type: Periodical ISSN/ISBN: 03090566 Abstract (Document Summary) In recent research on service quality it has been argued that the relationship between perceived service quality and service loyalty is an issue which requires conceptual and empirical elaboration through replication and extension of current knowledge. A study focuses on the refinement of a scale for measuring service loyalty dimensions and the relationships between dimensions of service quality and these service loyalty dimensions. The results of an empirical study of a large sample of customers from four different service industries suggest that four dimensions of service loyalty can be identified: purchase intentions, word-of-mouth...

Words: 10084 - Pages: 41

Free Essay

Service

...Executive Summary Introduction Clean Office Pros is a new cleaning service specializing in office cleaning and serving the Kansas City, Missouri area. The business will sell office cleaning and related services to businesses with office spaces of any size. To that end, Clean Office Pros seeks funding for equipment and initial operations of the business. The Company Established in 2009, the business offers office cleaning, floor treatment, carpet cleaning, and window cleaning for businesses with office space in the Kansas City area. The business was founded by Paul Vinci and Reid Werbitt, cleaning industry professionals with decades of collective experience, who have pooled their resources to develop a new strategy for reaching and serving business clients. The business will operate out of a central office and storage facility and use the labor of trained cleaning crews to serve clients. Services Services offered will be based around basic office cleaning scheduled on a monthly basis, which will be offered with extreme care for the client's privacy, security, and assets. Additional services will be sold to the same clients to deepen their relationship with Clean Office Pros. Organizational services will be introduced in after three years. Services will be environmentally friendly, both in the products used and in their methods of disposal. The Market The market currently consists of 40,000 small, medium, and large office businesses. Healthy......

Words: 331 - Pages: 2

Premium Essay

Case Analysis: the Ipremier Company - Denial of Service Attack

...Case Analysis: The iPremier Company - Denial of Service Attack Matthew M. Lambert Introduction: The e-commerce landscape is littered with the remnants of companies that didn’t survive the meteoric dot com boom and subsequent bust that began in the late 1990s. iPremiere Company, however, was the exception to the rule. Created by two college students in 1996, the web-based company had solidified its business position as a top online retailer of high-end, luxury goods with $32 million in sales and $2.1 million in profit for 2006. Consumers bought directly from iPremiere using credit cards, which were then stored on the company’s servers. In 2007, computer hackers launched a Denial of Service (DoS) attack on iPremiere’s website, temporarily shutting down the website and taunting iPremiere with emails. The possibility of hackers breaching its security firewall is extremely troubling because it puts customer financial information at risk and the loss of this public trust would be disastrous for iPremiere. The purpose of this paper is to assess why iPremiere was vulnerable to attack, examine their approach to both IT risk management and crisis communications and offer recommendations that foster customer trust and company profitability in the future. SWOT Analysis A brief SWOT analysis shows that iPremier’s strengths include good placement in the e-commerce marketplace and a highly experienced and productive team of managers and software developers dedicated to meeting......

Words: 1167 - Pages: 5

Free Essay

Leauge of Denial

...,“League of Denial” The NFL Concussion Crisis ave you ever taken the time to consider the consequence? Not the immediate consequence, maybe not even the short term, but the long term consequence of how we as society treat our bodies. For the NFL, its players and “Iron Mike” Webster, the consequence’s became reality on September 24th 2002 when “Iron Mike” meet Dr. Bennnet Omalu as he lay lifeless on a cold autopsy table at the Allegheny County Coroner’s Office. Concussion: a condition resulting from the stunning, damaging, or shattering effects of a hard blow; especially: a jarring injury of the brain resulting in disturbance of cerebral function and sometimes marked by permanent damage (http://www.merriam-webster.com/medical/concussion). Concussions have become more prevalent in the National Football League as awareness has risen. There are numerous cases of CTE that have resulted in permanent damage or death over the course of the last 15 years. The reality behind concussions is that there will never be a total solution to the issue, in contact sports the danger will always be there. We must continue to raise awareness and develop protective equipment to minimize the risk. Concussions are one of the leading causes of CTE among all professional athletes toady. Mike Webster retired in 1991 from the NFL and the Pittsburg Steelers after 17 years in the “pit” and made an attempt at a normal life, a short time into this journey it became apparent that “Iron......

Words: 770 - Pages: 4

Free Essay

Services

...it’s not matched to my order because when I tasted it, it’s not Java Chip that I ordered. I checked the name written on the cup to make sure if my name was placed there but my name was there. So, what I did was I went to the counter and complained about my order. I told them that they gave me a wrong order because it’s not really my order. After I complained, they apologized and said sorry to me. And what they did to recover their wrong service was that they gave me my order Java Chip with venti size which is the biggest size of their frappe. Also they gave additional product which was doughnut just to recover their wrong service. For me its passable, as long as they will recover what they did wrong to their customers and as long as they will satisfy their customers. Because there are some customers that are not easily satisfy with the replacement. But for me, it okay. Their strategies on how they will redesign their service are gradual. They will not let others customers know what happened. They will immediately do actions in that particular service. 2. Ministop I remembered when I bought a fried chicken meal at Ministop. Ministop is one of the convenient store like 7/11. But their difference is Ministop have their own fried chicken in their menu. So I was saying bought 2 pieces of friend chicken at Ministop and I found out that their chicken smelled spoiled. I tore a small piece of it and tore open its meat and then the smell came out. It was cooked alright but it......

Words: 1109 - Pages: 5

Premium Essay

Services

...organizational outcomes, and four required workforce competencies and behaviors. a) High technology products and services -Siemens Company established more than hundred years. The high technology nature of Siemens’ business allow employee to learn on a continuing basis. The most important thing is Siemens provide employees extensive continuing education and management development. They are also training employees for jobs that are new to them. This will not only can motivate employee to learn more but also can enhance the image of the Company itself directly. b) Team work management -team work management is essential for a corporation to be successful. This is because employee productivity is likely to be enhanced through existence of unity in the marketplace. If everyone works as a team and noticed the vision and mission of the company are going to achieve, the managers and employees will have a easier time arriving at a consensus when important decision are made. c) Expand products to global -Siemens wants to expand their business to become globalization and wants have the competitive advantage as compared to other company so the wealth of nationalities, cultures, languages, and outlooks represented by its employees is one of its most valuable asset. Siemens Human Resource understands their responsibilities which is placing right person in the right job. d) Service customers well -Siemens understand how the important of customers is, so Siemens Company doing the......

Words: 282 - Pages: 2

Free Essay

Denial of Service Attacks in Network Security

...Denial of service attacks in Network security introduction and short history of DoS attacks: Denial of service attacks are one of the major threat to the modern computer networks.It has been said that first DDoS attack was launched in 1999 against the IRC server of university of minnesota which affected 227 systems and server was down for several days.Another DoS attack was documented in the week of feb 7 2000.A 15 year old canadian hacker named “mafiaboy” performed a series of DoS attack against some sites like ebay and amazon.Companies suffered from 1.7 billion of damage.After that it became the best way of hacking among cybercriminals. People used to perform these attacks for profits.Hackers will follow the procedures like mafiaboy and ask for the money.In 2005 ,it became more easy to implement those attacks ,a boy of 18-yr old named Farid Essabar developed a worm called MyTob which used to open a backdoor in Ms windows hosts and connect to the remote IRC server.The computer then used to wait for the commands from the servers.Farid was arrested for distributing the worm.This was surely not the last case.DDoS attacks were used to attack and money extortion. As name suggests Denial of Service aka DoS, it’s main objective is to make the system to deny the legitimate service requests. Basically DoS attacks are performed by exhausting the resources of the computer like processing power,network bandwidth,TCP connection and service buffers,CPU cycles and so on.Hackers......

Words: 2218 - Pages: 9

G. H. Bass Men's argyle socks size 6-12 casual-dress Choose color 1 Pair 8-1333C | Hamtaro OVA 001 English Dubbed | Nea Dune