Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Basic Knowledge About Denial Of Service Or DoS
1. A denial of service attack is an explicit attempt to make a
network or PC resource not available to its legit users. It
occurs when an attacker tries to flood a network to bar
the legit network traffic, put off connections between 2
PCs in a manner that hinders access to vital services, block
a legitimate individual from gaining access to a specific
service and put off a service to a particular person or
system. Depending on the character of the attack, your PC
and network can be absolutely disabled therefore
exasperating your attempts to access emails, certain
websites, online accounts among other vital services. Go
to this webpage to learn more information about DoS and
the way to stop your online business against it.
3. Denial of service attacks are performed in different modes
dependent on the aims. There are 3 main types of attack
which include:
4. 1. Eradication of configuration info. An poorly configured
PC may perform poorly or fail to perform in any way. In
this mode, an attacker destroys a PCs configuration
information so preventing the user from using the PC in
any way. For instance, an assailant may meddle with your
routers routine information with a purpose of destroying
your network or the assailant may change your windows
NT registry with a purpose of making certain information
not available to you.
5. 2. Intake of limited resources. Networks and computers
require certain resources like CPU time, memory and disk
drive space, information structures, network bandwidth,
access to other PCs and networks and other resources like
power so as to operate effectively. An attacker can block
or destroy these resources with a purpose of barring the
hosts from communicating on the particular network.
6. 3. Physical destruction of network elements. The primary
concern in this sort of attacks is the physical security of
your network. It can be avoided by properly protecting
your PC from network wiring closets, unauthorized access
to your network, network backbone segments, cooling
stations and routers.
8. The denial of service attacks can result in major loss of
time and money. Therefore , it is the duty and
responsibility of each individual to take the necessary
steps in forestalling the attacks from happening. Here are
some of the steps that can be followed:
9. - Install and maintain an up to date antivirus software in
the network or PC.
10. - Install a firewall that should be configured to control the
traffic that comes in and leaves your network or PC.
11. - Adopt the security practices like email filters that
manage your e-mail distribution.
12. - Disable all the new and pointless network services to
obstruct an attacker from utilizing those services to
perform an attack.
13. - Implementing of the router filters to reduce the exposure
to certain types of attack and bar attackers from executing
attacks.
14. - Install patches which will guard your network against TCP
SYN flooding.
15. - Install and maintain backup schedules and policies for
the vital resources and info.
16. - Invest in fault long suffering and redundant network
configurations.
17. - Utilise and maintain password policies for the vital
accounts like the UNIX root MS Windows NT director.
18. - Use the tripwire to detect changes that can happen in
the configuration info or other urgent files.