Answered You can hire a professional tutor to get the answer.

QUESTION

Complete 6 pages APA formatted article: Penetrating testing techniques. This article will analyze some of these modern computer attacks, how they happen and ways of mitigating them.A DDoS attack is an

Complete 6 pages APA formatted article: Penetrating testing techniques. This article will analyze some of these modern computer attacks, how they happen and ways of mitigating them.

A DDoS attack is an ill attempt to make a network or server resource unavailable to users, often through disrupting or suspending the services of a connected host from the internet. The DDoS attack can be achieved by two main ways. First, the attacker, using malware or Trojan can take over several computers on the internet, creating a botnet in the process. Secondly, the attacker then controls the affected computers and makes them attack simultaneously the target thus achieving their initial goal (Gu & Liu, 2007).

The DDoS attacks can be resolved, mainly through the incorporation of blocking and detection mechanisms, that apply even during the spoofed attacks, when attacker profiles and identities are constantly changing. Others include, giving more complete capabilities of verification than either IDS signatures or static routers filters can provide. Prevent dependence on configuration changes or network device resources. In-built intelligence processes being infused with only contaminated traffic packets that would guarantee minimum scaling costs and maximum reliance. Implement procedures for communication standards to help guarantee maximum reliability and interoperability. Blocking and identifying individual spoofed packages to guard genuine business transactions (Patel & Patel, 2014).

TCP session, or session hijacking, is generally a means of taking over a session of a web user by obtaining surreptitiously the session Id and pretending to be the official session user. Once accessed, the invader can pretend to be the official user and freely access and manipulate data as they please.

Hackers popularly use routed IP packets from the original source to hijack a session. Through re-routing the communication to go through his computer, he can communicate with the different machines simultaneously.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question