StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

How you would attempt to keep a business from suffering a similar attack - Essay Example

Cite this document
Summary
(Name) (Instructors’ name) (Course) (Date) How you would Attempt to keep a Business from Suffering a Similar Attack Introduction From the presented scenario, it is clear that the website in question (grc.com) suffered a packet attack, also known as a distributed denial of service attack (DDoS)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
How you would attempt to keep a business from suffering a similar attack
Read Text Preview

Extract of sample "How you would attempt to keep a business from suffering a similar attack"

Download file to see previous pages

Key words Packet attack; juveniles; distributed denial of service (DDoS) What was Learned There is a lot that I have learned from the attack on grc.com. First of all, this attack was carried out by a 13 year old! He mentioned that together with his friends, he decided to attack the website following a “disparaging” remark that was made by the website in its newsgroup. Let me go back to my point. The logic here is not whether the attack was carried out by a group or an individual, but that a 13 year old was at the mastermind of the attack and even bragged about it.

What I learned from this is that “internet terrorism” is no longer a preserve of college students or people aged 16 and above (as previously thought). Maybe the 13 year old kid and his friends are very good at computers, but that is also beside the point. The fact that they took time to learn how to design and launch packet attacks is very worrying indeed and must be looked into. Overall, what I learned from this is that there is a new breed of hackers in town. These new breed is aggressive, smart and, surprisingly, unapologetic.

This calls for a revision of cyber terrorism combat strategies and techniques. What is also clear from the attack is that law enforcement agencies and authorities are not only ill-prepared but also poorly augmented to deal with the new class of hackers. For instance, the author reveals that when he approached the FBI after establishing that the individual who masterminded the attack was a 13 year old, he was met with the following responses: a) Until the damages done amounted to $5,000, no crime had been committed.

That is the law. b) Even if the damages done amounted to $5,000 and a crime was deemed to have been committed, their staffs were not only swamped but also overloaded with cases concerning firms that had incurred huge monetary losses caused by internet/cyber crime. c) Considering that the chief suspect was just 13 years old, there was not much that could be done to him, even if the amount of evidence confirmed that the attacks were planned and orchestrated by him. The most that could happen was a chat between some agents and his parents at his place of residence.

In essence, his youth gave him an impenetrable armor. This was a major discouragement of the costs likely to be incurred from any kind of investigation. These points prove my earlier assertion that law enforcement authorities and agencies (in this case the FBI) are not only ill-equipped but also poorly augmented to fight cybercrime that is perpetrated by juveniles. How I would Attempt to keep a Business from Suffering a similar Attack I would institute a number of effective measures to combat attacks similar to the one that was directed at grc.com. These measures include the following: Developing effective commands that will counter the possibility of suffering a similar attack.

This will work by helping businesses verify that their systems are not infected by any of the existing IRC Zombie/Bots. Since all the IRC Zombie/Bots usually trigger and maintain static links to remote IRC chat servers anytime the host computer is connected to the internet (Yang & Wanlei 22). An active link/connection can be detected using the following command; netstat –an | find “:6667”. Detection will pave way for termination. Encouraging businesses and firms to perform regular tests and checks that allow them to detect and consequently terminate harmful connections. Since IRC

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“How you would attempt to keep a business from suffering a similar Essay”, n.d.)
How you would attempt to keep a business from suffering a similar Essay. Retrieved from https://studentshare.org/information-technology/1477428-how-you-would-attempt-to-keep-a-business-from
(How You Would Attempt to Keep a Business from Suffering a Similar Essay)
How You Would Attempt to Keep a Business from Suffering a Similar Essay. https://studentshare.org/information-technology/1477428-how-you-would-attempt-to-keep-a-business-from.
“How You Would Attempt to Keep a Business from Suffering a Similar Essay”, n.d. https://studentshare.org/information-technology/1477428-how-you-would-attempt-to-keep-a-business-from.
  • Cited: 0 times

CHECK THESE SAMPLES OF How you would attempt to keep a business from suffering a similar attack

Security Risks Arising from Social Networking

This dissertation "Security Risks Arising from Social Networking" basically explores the security risks associated with social networking to individuals and organizations, and the possible technical and administrative safety measures.... hellip; Social media platforms are known to offer important business advantages to companies and organizations but at the same time, they are well-known security risks to individuals and institutions.... The major barrier however is that many organizations are unsure of how to come up with effective policies in social media....
36 Pages (9000 words) Dissertation

Types of Devices and How They Are Cloned

The paper "Types of Devices and How They Are Cloned" discusses that an attacker who has made the clone of a mobile phone or SIM card can cause serious damage to a mobile account, in the form of suffering huge expenditures by having pay-per-call services, making distance calls.... Some of the common uses of cloning are outlined below: Reinstatement of the computer after a crash Without a doubt, a clone of boot drive is believed to be a critical tool for retrieval from a state that occurs due to a system crash or failure....
10 Pages (2500 words) Essay

Advanced marketing strategy

So, they use different strategies in different countries to keep their product in demand; usually people get addicted to these like coke or else use to it, like pampers.... GM also have to work efficiently to cover up all the different price ranges which are already present in the market, which will prevent any new entrants from venturing into the market and also to compete with the small player that existed within these price divisions.... A re-interpretation of generic strategies from the perspective of market relationships is necessary....
11 Pages (2750 words) Essay

Suicide Bombing and Why It Is a Common Terrorist Act

Suicide bombing is a bomb attack in which bomber dies in carrying out the attack deliberately allows himself or herself to be killed in the process of attempting to destroy something or kill somebody (Encarta) .... Suicide attack is an attack on a military or civilian target, in which an attacker intends to kill others, and knows that they will either certainly or most likely die in the process which includes vehicles filled with explosives, passenger planes carrying large amounts of fuel, and individuals wearing vests filled with explosives in other words, it is a martyrdom operations (Suicide attack pars 1). ...
15 Pages (3750 words) Essay

Spyware and Implementing Network Security

Some variants attempt to track the websites a user visits and then send this information to an advertising agency.... More malicious variants attempt to intercept passwords or credit card numbers as a user enters them into a web form or other application.... Purposes range from overtly criminal (theft of passwords and financial details) to merely annoying (recording Internet search history for targeted advertising, while consuming computer resources)....
19 Pages (4750 words) Essay

Spyware and Implementing Network Security to Prevent it

Some variants attempt to track the websites a user visits and then send this information to an advertising agency.... More malicious variants attempt to intercept passwords or credit card numbers as a user enters them into a web form or other application.... Personal information is secretly recorded with a variety of… Purposes range from overtly criminal (theft of passwords and financial details) to the merely annoying (recording Internet search history for Spyware may collect different types of information....
20 Pages (5000 words) Essay

Networks, Telecommunications and Wireless Computing

n addition, M-coupons are an improved form of business marketing as compared to customary paper-based coupons for the reason that sometimes customers are not able to keep remember to bring paper coupons from home, on the other hand, the majority of mobile phone users keeps their mobile/cell phones with them for all time consequently there is no way they forget or misplace the coupons.... These barcode readers can read this code from the mobile phone screens.... Moreover, they can be erased from the phone besides they have been utilized....
15 Pages (3750 words) Research Paper

Cyber Security Issues

So an attempt to have an all-round security solution is always hampered with the fact that different institutions would have different security needs.... Subsequently, because victims are not able to trace the origins of the attacks to a single source, it becomes difficult to control the rapid spread and widespread damage that is caused by the attack launch.... It is in line with this that Orrey (2011) notes that with multiple and differing attack vectors, chances are always higher that attackers will succeed....
38 Pages (9500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us