Distributed Denial-Of-Service Attacks
This summary is being prepared for Mr. Burke the Chief Information Security Officer. This summary is to share information on what steps will be taken to protest the organization from security risks.
Denial-of-Service attacks (DoS): Some of these attacks cannot be stopped prior to happening. Therefore, ensuring that a firewall has been established between the company and the internet can limit these types of attacks. Many different filtering devices, IPsec, can offer security.
Distributed Denial-of-Service attacks (DDoS): This attack can be a difficult to fix. Installing hardware or software will not be the only way to stop this attack. It may be best to make the purchase of an Intrusion detection system. With this system statistical analysis reports are available to be analyzed. (Merike Kaeo, pp. 360-361) The IDS monitors network traffic and monitors for suspicious activity and alerts can be sent to either Allison Tanney or Manual Lopez.
Masquerading and IP Spoofing: This type of attack is when an attacker compromised the routing packets to forward a file or transmission to a different destination. (The Reading Room SANS, p. 4) With this type of risk, there are cryptographic authentication mechanisms that can be used to prevent this risk. (Merike Kaeo, p. 250) Also if the network has Dynamic Host Configuration Protocol this will aid in finding an impersonator. With this DHCP the network department manages and automates the assignment of IP addresses for the organization. (SearchUnifiedCommunications) Using an ACL deny to filter out IP addresses that do not belong.
Smurf attacks: Attacks of this kind and to prevent or stop them it is best to make sure that all network equipment has been properly configured. One way is to have the directed broadcast of all router ports turned off. (Preventing Smurf Attacks)
Land.c attacks: Land.c attack is against the TCP implementations which causes the operating system to hand up. Ensure that there are effective anti-spoofing firewalls in place to deter from these attacks.
Man-in-the-Middle attacks: Man-in-the-middle attacks are on the wireless connections. The use of passwords must be stringent. As this attack can occur when two devices are sending and receiving transmissions, the attacker and intercept and grab the communication. (MIT Technique may stop man-in-the-middle wireless attacks)
With the attacks described