Assignment_chp8_itm5600

.docx

School

Trine University *

*We aren’t endorsed by this school

Course

6953

Subject

Information Systems

Date

Jul 2, 2024

Type

docx

Pages

4

Uploaded by HighnessMetalMantis41

Distributed Denial of Service (DDoS) Attack Attack on DDoS, or Distributed Denial of Service To disrupt regular operation of a server, service, or network, a Distributed Denial of Service (DDoS) attack aims to overload it with an excessive volume of traffic from several sources. To make the target unreachable by authorized users, all the server's resources—memory, processing power, and bandwidth must be used (What Does Attack Mitigation Mean? | Security Encyclopedia, n.d.). Implementation Methodology In a distributed denial of service (DDoS) attack, an attacker takes control of a "botnet" of hacked servers, PCs, internet of things (IoT) devices, and other internet-connected devices. The hacker then commands the botnet to concurrently flood the targeted system with requests, causing a breakdown or unresponsiveness owing to the high volume of traffic. Plan Distribution denial of service attacks mostly target networks, well-known web servers, and online services. Every system connected to the internet and depending on dependable availability and performance is vulnerable to DDoS attacks (What Does Attack Mitigation Mean? | Security Encyclopedia, n.d.). The usual victims include cloud service providers, public organizations, internet marketplaces, and financial institutions. Potential Damage to Our Organization Possible results of an attack on our organization by distributed denial of service (DDoS) include:
Distributed Denial of Service (DDoS) Attack Electronic Media Downtime: Customers would not be able to use our online services and websites aimed at them, which would lower our revenue, productivity, and damage our reputation. Employee access to vital systems and data might be hampered by congested internal networks, which has an impact on the way our company runs. Stress in the Data Center Should a large DDoS attack strike our data center, its resources may be overrun, resulting in system failures or even data loss. Because of lost sales opportunities, productivity costs, and the potential for fines for breaking service level agreements (SLAs), downtime and service interruptions cost money (National Cyber Security Centre, 2020). Reputational Damage: Well publicized attacks have the potential to harm our brand's standing and the confidence of our clientele, with long-lasting consequences (JPMorgan, 2022). Mitigation Recommendations: These actions by our organization can reduce the possibility of distributed denial of service attacks: Defense Against DDoS Services Put in place particular services or solutions to stop distributed denial of service (DDoS) assaults before they ever get to our network. Bandwidth redundancy: Apply load balancing among several internet service providers (ISPs) and expand the bandwidth of the internet to handle traffic spikes. To identify and stop malicious internet traffic that could jeopardize our services and applications, install web application firewalls (WAFs) (JPMorgan, 2022). Plan for quick detection, mitigation, and recovery of DDoS events and test it often. For all your systems, software, and security solutions, always utilize the most current fixes and upgrades. Any known vulnerabilities will be helped to be fixed by this. To stop distributed denial of service (DDoS) attacks, staff members must be made aware of the need to
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help