In a wellwritten paper write a response to three of the foll

In a well-written paper, write a response to three of the following five questions:

What are the common tools used to protect against a DoS (Denial of Service) or DDoS (Distributed Denial-of-Service) attack?

What is malware and how does it spread?

What is a Buffer-Overflow attack?

How does a SQL injection attack take place?

What are some of the tools that a hacker can use to crack passwords?

Your paper should meet the following requirements:

Be two to three pages in length, not including the cover page and reference page.

Solution

Solution:

Q1. The common tools used to protect against a DoS or DDoS are given below:

-- Different types of firewall solutions are available that accurately identify the DoS or DDoS attack through patterns recognition system.

-- Allowing or denying the IP addresses, ports, protocols that may be harmful for the web applications.

-- by using edge routers, accepting traffic from only those source addresses which are known to the database.

-- by configuring the rate limits for SYN packets.

-- hiding the IP address of the server by keeping it secret, so that the attacker cannot reach the server.

Q2. Malware is a short form of malicious software. It is purposely designed to create interference in the proper functioning of the computer, gather sensitive information, hijacking the computers and gaining unauthorized access to the system. It can infect applications, utility or system programs, and other programs related to the booting. It is sometimes passed officially by the companies as a part of their programs. It may be in the form of Trojan horse viruses, worms and other types of system viruses. Malware spreads through different ways :

Social networks: through third party access to your profile

Pirated softwares: through malicious codes

E-mails: comes through attachment

Removable media: Through USB sticks

Websites: Contains malwares that enters the system when you visit them.

Q3. Buffer overflow attack is defines as the type of attack when a program or process overwrites memory adjacent to the buffer or tries to write more data to a fixed length allocated to the buffer. Buffer overflow attack make the program unstable or crash it down. Except from crashing the program, the attacker can overwrite the important variables like Instruction pointer (IP) or base pointer (BP). By making changes to these pointers attacker can easily execute his malicious code.

In a well-written paper, write a response to three of the following five questions: What are the common tools used to protect against a DoS (Denial of Service)

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site