Category: Business Data communications

  • Title: The Impact of a TCP SYN Flood Attack on a Financial Institution

    For this
    exercise, you will perform research and develop a brief paper on the subject
    described below.
    A Denial of Service (DOS)
    attack typically involves the misuse of standard TCP/IP protocols or connection
    processes so that the target for the DOS attack responds in a way designed to
    create maximum trouble. Read the TECHNICAL FOCUS 11-2 “Inside a DoS Attack” on
    page 307 and become familiar with the five common types of TCP/IP attacks.
    Information from page 307:
    TECHNICAL FOCUS 11-2
    Inside a DoS Attack
    A DoS attack typically involves the
    misuse of standard TCP/IP protocols or connection processes so that the target
    for the DoS attack responds in a way designed to create maximum trouble. Five
    common types of attacks include the following:
    ICMP Attacks The network is flooded
    with ICMP echo requests (i.e., pings) that have a broadcast destination address
    and a faked source address of the intended target. Because it is a broadcast
    message, every computer on the network responds to the faked source address so
    that the target is overwhelmed by responses. Because there are often dozens of
    computers in the same broadcast domain, each message generates dozens of
    messages at the target.
    UDP Attacks This attack is similar to
    an ICMP attack, except that it uses UDP echo requests instead of ICMP echo
    requests.
    TCP SYN Floods The target is swamped
    with repeated SYN requests to establish a TCP connection, but when the target
    responds (usually to a faked source address), there is no response. The target
    continues to allocate TCP control blocks, expects each of the requests to be
    completed, and gradually runs out of memory.
    UNIX Process Table Attacks This is
    similar to a TCP SYN flood, but instead of TCP SYN packets, the target is
    swamped by UNIX open connection requests that are never completed. The target
    allocates open connections and gradually runs out of memory.
    Finger of Death Attacks This is
    similar to the TCP SYN flood, but instead, the target is swamped by finger
    requests that are never disconnected.
    DNS Recursion Attacks The attacker
    sends DNS requests to DNS servers (often within the target’s network) but
    spoofs the from address so the requests appear to come from the target computer
    that is overwhelmed by DNS responses. DNS responses are larger packets than
    ICMP, UDP, or SYN responses, so the effects can be stronger.
    Source: Adapted from “Web Site
    Security and Denial of Service Protection,” www.nwfusion.com.
    Select one attack method and conduct
    research using the Internet and libraries available through your Cougar-Track
    account to develop a 900-1000-word (approximately 4 double space pages)
    narrative of an actual attack which used the method you selected.
    Use the following list of significant
    points to consider as you create your paper.
    1.  
    Why
    was the target selected? (For social, political, financial reasons?)
    2.  
    What
    was the target’s network security posture prior to the attack?
    (Passively/Actively protected, indifferent about cyber security?)
    3.  
    What
    was the loss to the target? (Information, financial data, customer/personal
    information?)
    4.  
    What
    secondary impact did the attack have, and to whom? (Banks, investments,
    suppliers etc.)
    5.  
    Identify
    the person or organization that claimed responsibility for the attack.  In
    your own words, describe why you believe they performed the attack.

  • Title: Protecting the Internet of Things: Evaluating Cybersecurity Challenges and Solutions

    Please read instructions here: 
    TERM
    PAPER TOPIC
    Topic: Cybersecurity in the IoT Era:
    Evaluating the challenges and solutions in protecting interconnected devices
    from cyber threats.
    The paper aims to investigate the security hurdles
    encountered by the Internet of Things (IoT) and the corresponding solutions
    devised to address these concerns. It will primarily concentrate on pinpointing
    prevalent vulnerabilities within IoT devices while assessing the efficacy of
    existing cybersecurity protocols.
    The
    Term Paper should be a minimum of 4 pages and a maximum of 5 pages in length
    (not including title page, abstract, cited references, etc.).” 
    You should develop about 4 pages of content +
    cover page + abstract + reference page = 8-9 total pages.
    Write a Term Paper on any subject
    within the field of Business Data Communications and Networking. If the
    subject is a controversial issue you will need to state both the debate and
    briefly describe the different views on the topic (maybe more than two), before
    stating your views on the topic. If you are writing about an emerging issue you
    must state where it has been, why it is changing, and hypothesize where it will
    go and what impact that will have on the field. Your papers should be an
    examination on these topics supported vigorously with scholarly research.
    The paper is due Wednesday (11:59
    p.m. CT).
    The paper must be prepared and submitted as a
    Microsoft Word document (.doc, .docx, or .rtf).
    The Term Paper should be:
    A minimum of 4 pages and a
    maximum of 5 pages in length (not including title page,
    abstract, cited references, etc.).
    Typed, double-spaced, and
    12-point font (Times New Roman).
    Written in proper APA format,
    i.e., a title page, an abstract, in-text citations and a reference page.
    You must have a minimum of 5 references of
    scholarly quality (your course textbook can be used as source).  
    Keep in mind, there are several unacceptable
    resources which cannot be used for any course assignment, including your
    term papers.  
    The use of the following sources like Wikipedia,
    Wiki Info, and Anarchopedia will negatively impact your grade.
    Remember, Columbia College policies concerning
    plagiarism will be strictly enforced regarding these term papers. Please
    take this matter very seriously because plagiarism software is used on
    every term paper submitted.
    Do not use term papers previously submitted to
    other CC courses.