Question

Discuss in-depth a Denial of Service (DOS) attack including the recent attacks on Miami-Dade Schools and...

  1. Discuss in-depth a Denial of Service (DOS) attack including the recent attacks on Miami-Dade Schools and the presidential election in 2020. Please include in your discussion how a DOS cyber attack is done, motivations for doing so, and how companies can protect themselves including accounting systems. Please do not include a definition of what a DOS attack is.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

DOS attack on Miami-Dade Schools

DOS attack done by - 16 years old male from south miami

Method used - Low Orbit Ion Cannon (Disrupts Websites)

Damage Caused - Causing the system crash during first three days of school year

How a DOS cyber attack is done -

"They generally accomplish this by flooding the target with traffic or sending information that activate a crash"

In both the types above they disposes the legitimate users of service i.e the employees of organisation or members or any account holders etc';

They often target the high profile organisations such as banks,commerce,government organisations etc;

They do not typically lead to loss of information or as such but it can cost us in time and money to handle

The signs of DoS attacks :

  • The website is responding slowly.
  • The website is unresponsive.
  • The user has problems accessing the website.
  • Internet connection issues if you are a target.

There are two general methods of DoS attacks: flooding services or crashing services. Flood attacks occur when the system receives too much traffic for the server to buffer, causing them to slow down and eventually stop. Popular flood attacks include:

Buffer overflow attacks – the most common DoS attack. The concept is to send more traffic to a network address than the programmers have built the system to handle. It includes the attacks listed below, in addition to others that are designed to exploit bugs specific to certain applications or networks


ICMP flood – leverages misconfigured network devices by sending spoofed packets that ping every computer on the targeted network, instead of just one specific machine. The network is then triggered to amplify the traffic. This attack is also known as the smurf attack or ping of death.


SYN flood – sends a request to connect to a server, but never completes the handshake. Continues until all open ports are saturated with requests and none are available for legitimate users to connect to

Motivation Behind DDoS Attacks?

Hacktivism - occurs when hackers want to deploy an attack in order to spread a message.

Targeted attacks - Can be used to damage a website’s reputation or to cause pain for a marketing team.

Pure Boredom - Idea of people attacking a website out of sheer boredom and amusement.

How companies can protect themselves including "Accounting Systems" ?

1. Activate a Website Application Firewall Protection From DDoS Attacks

Trusted Zone Server Server I Server Firewall Server 0 Network Firewall Website Firewall LL External Zone

2. Country blocking

General Health Check Access Control Security HTTPS/SSL Performance DNS API Whitelist IP Addresses Geo Blocking Save Blacklist

3. mONITOR tRAFFIC

4. Block Application Layer DDoS Attacks

Add a comment
Know the answer?
Add Answer to:
Discuss in-depth a Denial of Service (DOS) attack including the recent attacks on Miami-Dade Schools and...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Please study Chapter 7,and carefully examine the case study: "Foreign Companies in China Under Attack" please...

    Please study Chapter 7,and carefully examine the case study: "Foreign Companies in China Under Attack" please I want more 700 word respond to the following Discussion Questions. 7-12. What factors do you think are behind these events? Do some research to find out whether there have been more such problems since this writing. Is it just American companies that are being targeted? 7-13. What can firms currently operating in China, or considerating investment there, do to lessen the likelihood of...

  • Please study Chapter 7,and carefully examine the case study: "Foreign Companies in China Under Attack" please...

    Please study Chapter 7,and carefully examine the case study: "Foreign Companies in China Under Attack" please I want more 700 word respond to the following Discussion Questions. 7-12. What factors do you think are behind these events? Do some research to find out whether there have been more such problems since this writing. Is it just American companies that are being targeted? 7-13. What can firms currently operating in China, or considerating investment there, do to lessen the likelihood of...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions...

    Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions listed below in specific detail. A minimum of 4 pages is required; ensure that you answer all questions completely Case Questions Who are the main players (name and position)? What business (es) and industry or industries is the company in? What are the issues and problems facing the company? (Sort them by importance and urgency.) What are the characteristics of the environment in which...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT