This website uses cookies to ensure you have the best experience. Learn more

Best Practice Guide For A Ddos Attack

935 words - 4 pages

Running head: Best Practice Guide

Best Practice Guide for a DDoS Attack
WGU – LOT2 Hacking Task 2

Abstract
This paper will accompany a PowerPoint presentation about best practices for preventing a DDoS attack. This will be the best practice guide and will be mentioning and elaborating all of the points in the slideshow.

Best Practice Guide for a DDoS Attack
It is important to have a plan in place when dealing with a DDoS attack. This guide will serve as the best practice guide for the university. Outlined will be some of the best practices to help prevent a DDoS attack and will be followed by the university.
The first ...view middle of the document...

Firewalls are usually the first line of defense and are good way to provide a basic form of protection. The basic principle of a firewall is to block and allow traffic through the network. This is all done through access control policies so whoever is setting up the firewalls needs to know what they need to block and allow. (Robertson, P., Curtin, M., & Ranum, M., 2004) This is why an intrusion prevention system is good to add along firewalls. These systems are designed to monitor and prevent malicious activity from gaining access to your network. These are preferred over intrusion detection systems because they only detect and will not prevent traffic.
The computer lab will now need to be secured to help deter against DoS and DDoS attacks. The first thing that will need to be done is to secure access to the computer labs. This can be accomplished by installing cipher locks to the doors that require a password or better yet, install an electronic access panel that can be opened by access badges or cards. This will allow you to keep an electronic record of who enters the lab and at what time.
Each computer will only be accessible by signing in and being assigned a specific computer. Each user will only be able to use a guest account while they are on the computer. This will prevent them from installing any type of password sniffing software or any other malicious software. The administrators will be the only ones that know the administrator password used on all the computers. The standard of 2 uppercase, 2 lowercase, 2 numbers and 2 special characters and minimum of ten characters long will be used when creating the admin password. The password will be changed every 30 days so if a brute force attack were ever successful, the password...

Other assignments on Best Practice Guide For A Ddos Attack

Ceh Course Essay

458 words - 2 pages attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you

Outline

288 words - 2 pages research and the use of evidence based practice. Professional nurses advocate for the wants and needs of their patients. They communicate with patients, families, doctors, and many other healthcare professional on the interdisciplinary team. Professional nurses are motivated by altruism, have a unique body of knowledge, and use the nursing code of ethics to guide their decisions (Black, 2014). They are critical thinkers and decision makes in the many

Indian Auto-Component Supply Chain At The Crossroads

281 words - 2 pages chain performance indicators. This study served as a guide to the supply chain mangers and strategists of auto component firms in emerging markets who are seeking to improve their position in global marketplace. The objective of this study was to analyze the key challenges facing different sections of the Indian auto industry. They tried to identify areas which need significant attention, and identify opportunities for service providers, who could

Global Finance

3346 words - 14 pages software DoS/DDoS attack from the WAN/Internet WAN 1 Create DMZ for data protection. Ensure the use of up to date software to prevent such attacks User destroys data in application and deletes all files User 2 Create back up of all data after use and limit user access to deletion permissions. Unauthorized access to organization owned workstations User 2 Authorization protocols should be made stricter. Loss of essential production data System

Negligence Paper

1132 words - 5 pages . It would be important to document what information you passed on to other medical staff and to whom you spoke with. As a nurse it is my ethical responsibility to make sure that my patient has the best care possible and that no harm comes to them while under my care. It is important for the patient to have autonomy, confidentiality, fidelity, veracity, and justice. A nurse should practice with compassion and respect for the dignity of every

Business Management

687 words - 3 pages Week 8 Worksheet Instructions: Scroll to Chapter 8 of your GRST online textbook (found in the Reading & Study folder) and complete Practice 8.3 and 8.4 to help you learn correct citation. The best way to learn to do citation is to practice. In this worksheet, you will make a brief citation reference sheet for yourself, which you will use as you write your final paper and any future papers at Liberty University Online. The worksheet you make

Aicpa Code Of Professional Conduct

417 words - 2 pages audit for a client. These principles are put into place to protect the public and also to protect CPA’s, because as they follow them they will ensure that their practice is honest, responsible, and ethical, allowing no leeway for unethical behavior. The most important purposes of the AICPA Code of Professional Conduct are to honor the public’s trust, to enforce the ethical obligations of the CPA’s and to provide guidance in the performance of the

Mentorship

373 words - 2 pages 12 Ghaye, T & Lillyman, S (2001) Reflection: Principles and Practice for Healthcare Professionals. Wiltshire, Mark Allen Publishing ltd Goodman,B. and Clemow,R., 2010, Nursing and Collaborative Practice: A guide to interprofessional learning, Sage publication Gottlieb,L.N., Feeley,N., 2005, The Collaborative Partnership Approach to Care: A Delicate Balance, Elsevier Health Sciences,Ontario Canada Grossman,S., 2013,Mentoring in Nursing: A

General

949 words - 4 pages 2013 to $4.7 billion as of 2018. The engineering practice on industrial application is responsible for more than half of the revenue. 3D printing on industrial application can have a big impact on most of the things ranging from the design procedures, installation, reprocessing as well as storage. It could also permit engineers to create pieces of stuff that we were not in a position to formulate before. Storage along with transport can become

Opsec And Terrorism

5936 words - 24 pages airfield, it's likely that he'll be on this upcoming mission in order to leave for his R&R. They begin to plan the attack. Terrorist forces are not necessarily military combatants, by definition. However, many terrorists have extensive military training and maintain a tactical mindset. As such, they will not only seek to exploit vulnerabilities, but also practice OPSEC when conducting their own operations. As there are no consistent limitations to

Nursing Expertise Self-Report Scale Reflection

449 words - 2 pages one another and developed an instant bonding. In conclusion, there are many factors that affect how nurses from different years of expertise handle certain patient scenarios. Each nurse has her own beliefs and rationale for her actions to obtain the best patient outcome. References  Hansten, R. I., & Jackson, M. (2009). Clinical delegation skills: A handbook for professional practice (4th ed.). Sudbury, MA: Jones & Bartlett.

Similar Documents

Student Guide For Writing A Marketing Plan

1392 words - 6 pages Stutendt STUDENT GUIDE FOR WRITING A MARKETING PLAN 1. Executive Summary The Executive Summary “sells” the marketing plan to readers through its clarity and brevity. The summary should present a description of the product/service, its target market, and its need within the market. The summary should also provide an overview of the main points of the plan and should emphasize an action orientation. 2. Company Description The

Secutiry Threats Essay

452 words - 2 pages security breaches to you computer, to steal passwords account information, or use your computer to create (DDoS) Denial of service attacks. A DDoS is a hacker’s way of using one’s computer as a robot to attack high profile website or a denial of service. Unprotected Windows networking shares can be exploited by intruders in an automated way to place tools on large numbers of Windows-based computers attached to the Internet. Because site security on

Case Stury Essay

4098 words - 17 pages  catch. As other  forms of disruptive activism are being punished with slaps on the wrist, these hacktivists and  their allies are pleading their case to the public that these incommensurate punishments are cause  for concern.     Command Prompt  Through a discussion about the facts and the positions of the actors involved with regard  to hacktivism, it will become clear that the lack of a plain and fair legal doctrine is indeed to  blame for the

Is3220 Paper

1272 words - 6 pages types of attack can be prevented. SQL injection should be mitigated by filtering and defensive programming. Eavesdropping – Snooping and eavesdropping are very important to a network’s security as this can be the first step of action a hacker will try to use to learn not only sensitive data, but to plan for future attacks that could further cripple a system. The key to preventing this is ENCRYPTION, ENCCRYPTION, ENCRYPTION! Data should be