Assuming that one of the attacks used to defraud Zambian banks was a DDoS attack, describe in depth with the aid of a diagram what a Distributed Denial of Service (DDoS) attack is. Give the steps that could be followed by the banks in the event of the DDoS assault on their systems

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

Assuming that one of the attacks used to defraud Zambian banks was a DDoS attack, describe in depth with the aid of a diagram what a Distributed Denial of Service (DDoS) attack is. Give the steps that could be followed by the banks in the event of the DDoS assault on their systems

| According to Microsoft's estimate, in 2014 about one half if all adults connected to the internet were
victims of cybercrime. This costs the world economy 500 billion dollars; 20% of all small and medium-
sized enterprises (SMES) have been hit. These estimations are confirmed by Meril Lynch Global
Research, who, in a 2015 report, also predict a potential "Cybergeddon" in 2020, when cybercrime
could extract up to one-fifth of the value generated by the Internet.
As far as the African continent is concerned, there are fewer available data this shows the absence of
measuring tools and of control of cybercrime.
However, and to serve as an illustration: a study conducted by International Data Group Connect
showed that each year, cybercrime cost the South African economy an estimated 573 million dollars.
For the Nigerian economy the cost was estimated to be 500 million dollars, and for the Kenyan
economy, 36 million dollars.
Proportionally speaking, for middle income countries this represents enormous sums. Another study
conducted by Deloitte and dating back to 2011 showed that financial institutions in Kenya, Rwanda,
Uganda, Tanzania, and Zambia had sustained losses of 245 million dollars, attributable to cyberfraud.
Lastly, several Zambian commercial banks were defrauded of over 4 million dollars in the first semester
of 2013, as a result of a complex cybercrime scheme involving Zambians as well as foreign nationals.
In francophone Africa, the phenomenon is mostly to be found in the main regional economies. For
instance, in 2013 the estimated cost of cybercrime in the Ivory Coast was 26 billion CFA Francs (3.8
million euros). In Senegal the cost was estimated to be 15 billion CFA francs (22 million euros). At an
international forum on cybercrime in 2016 in Dakar, Charles Kouamé, in charge of governance in the
Ivorian Authority for the regulation of telecommunications, pointed out that 1.409 complaints had been
lodged and acted on by the Ivorian courts last year. According to him, the global volume of Web based
fraud in the country seems to have started to decrease, falling from 5.8 billion CFA francs (8.9 million
euros) in 2014 to 4 billion CFA francs (6,1 billion euros) in 2015.
These figures show the size of the problem in a part of the world which is currently experiencing
exponential growth, fed by the rise in the prices of raw materials and the boom in the technological
sector, to which one could add the rise in the incomes of the middle classes. Even if they can't buy the
Transcribed Image Text:| According to Microsoft's estimate, in 2014 about one half if all adults connected to the internet were victims of cybercrime. This costs the world economy 500 billion dollars; 20% of all small and medium- sized enterprises (SMES) have been hit. These estimations are confirmed by Meril Lynch Global Research, who, in a 2015 report, also predict a potential "Cybergeddon" in 2020, when cybercrime could extract up to one-fifth of the value generated by the Internet. As far as the African continent is concerned, there are fewer available data this shows the absence of measuring tools and of control of cybercrime. However, and to serve as an illustration: a study conducted by International Data Group Connect showed that each year, cybercrime cost the South African economy an estimated 573 million dollars. For the Nigerian economy the cost was estimated to be 500 million dollars, and for the Kenyan economy, 36 million dollars. Proportionally speaking, for middle income countries this represents enormous sums. Another study conducted by Deloitte and dating back to 2011 showed that financial institutions in Kenya, Rwanda, Uganda, Tanzania, and Zambia had sustained losses of 245 million dollars, attributable to cyberfraud. Lastly, several Zambian commercial banks were defrauded of over 4 million dollars in the first semester of 2013, as a result of a complex cybercrime scheme involving Zambians as well as foreign nationals. In francophone Africa, the phenomenon is mostly to be found in the main regional economies. For instance, in 2013 the estimated cost of cybercrime in the Ivory Coast was 26 billion CFA Francs (3.8 million euros). In Senegal the cost was estimated to be 15 billion CFA francs (22 million euros). At an international forum on cybercrime in 2016 in Dakar, Charles Kouamé, in charge of governance in the Ivorian Authority for the regulation of telecommunications, pointed out that 1.409 complaints had been lodged and acted on by the Ivorian courts last year. According to him, the global volume of Web based fraud in the country seems to have started to decrease, falling from 5.8 billion CFA francs (8.9 million euros) in 2014 to 4 billion CFA francs (6,1 billion euros) in 2015. These figures show the size of the problem in a part of the world which is currently experiencing exponential growth, fed by the rise in the prices of raw materials and the boom in the technological sector, to which one could add the rise in the incomes of the middle classes. Even if they can't buy the
usual computer "kit" (PCs, printers, routers etc) they can now connect to the Internet with smart phones,
the prices of these devices having dropped significantly in the last ten years.
This explains why, in 2013, in Sub-Saharan Africa alone 311 million mobile phone users were counted
|(a penetration rate of 36 %). The figure should reach 504 million in 2020 (49% penetration rate). For its
part, the International Telecommunications Union (ITU) estimates that one African out of every five now
uses the Internet.
Source: (Online] https://www.scidev.net/sub-saharan-africalicts/feature/cybercrime-africa-facts-
figures.html#-text=Hundreds%20of%20millions%20of%20cyber%20attacks%20take%20place,a%20heavy%20price?% 20BY%3A%20Jean%2
OShiloh%2C%20Amzath%20Fassassi (Accessed on: 11 May-2020]
Transcribed Image Text:usual computer "kit" (PCs, printers, routers etc) they can now connect to the Internet with smart phones, the prices of these devices having dropped significantly in the last ten years. This explains why, in 2013, in Sub-Saharan Africa alone 311 million mobile phone users were counted |(a penetration rate of 36 %). The figure should reach 504 million in 2020 (49% penetration rate). For its part, the International Telecommunications Union (ITU) estimates that one African out of every five now uses the Internet. Source: (Online] https://www.scidev.net/sub-saharan-africalicts/feature/cybercrime-africa-facts- figures.html#-text=Hundreds%20of%20millions%20of%20cyber%20attacks%20take%20place,a%20heavy%20price?% 20BY%3A%20Jean%2 OShiloh%2C%20Amzath%20Fassassi (Accessed on: 11 May-2020]
Expert Solution
steps

Step by step

Solved in 3 steps with 1 images

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY