A web-based registration and cashiering system

Assignment Help Basic Computer Science
Reference no: EM13268284

You work for a large public university that utilizes a web-based registration and cashiering system that allows students to register for, pay for, and drop classes. Naturally, peak usage times are during registration season shortly before the start of a new quarter. The system has been in place for about a year and a half and has greatly reduced the workforce needed to staff the registration office during registration season; as a result of implementing the new system, over three-quarters of the registration staff were reassigned to other parts of the university.

However, during registration for the most recent quarter, the web-based system suffered a crippling distributed denial-of-service (DDoS) attack that made the system unavailable for about 24 hours. The university's network staff was certain that the attack did not initiate from an external network source since the university has a series of mechanisms in place to intercept such attacks. Further investigation revealed that the attack originated from the internal network. The network team discovered that a password sniffer application was somehow installed on a large portion of the computers in various university computer labs. The password sniffer captured one of the administrative passwords that was recently used to remotely install a critical operating system patch for these computers. Once compromised, the computers were then used collectively to perform a DDoS attack that flooded the registration system's web servers with thousands of bogus HTTP requests, which quickly overwhelmed the servers and caused them to become unavailable.

As the lead network specialist, you have been asked to recommend countermeasures to protect the university's registration system against this type of denial-of-service (DoS) attack.
Task:
A. Create a diagram to illustrate how the attack occurred. In your diagram, include the following:

  • The web server

 

  • Computer labs

 

  • Network equipment

 

  • How the traffic is flowing to the registration system

B. Recommend in an executive summary (suggested length of 2 pages) preventive measures to counter this type of DoS attack.
Note: The executive summary will be read primarily by nontechnical management staff, so it is important that the summary sufficiently develops and addresses the topic but does not overwhelm the reader with unexplained technical terminology.
C. When you use sources, include all in-text citations and references in APA form

 

Reference no: EM13268284

Questions Cloud

Learning objectives using blooms taxonomy : Construct three learning objectives containing appropriate active verbs. Identify a possible teaching strategy for each of your objectives.
Explain halogen compounds to five or more significant : Calculate the formula for each of the following halogen compounds to five or more significant figures
Explain how much dry solute would you take to prepare : How much dry solute would you take to prepare each of the following solutions from the dry solute and the solvent
Design cmos differential pair amplifier with low freq gain : Design a CMOS Differential pair amplifier with a low frequency gain of at least 30dB, while driving a resistive load 50-ohm. The available circuit components are NMOS transistor, PMOS transistor, resistors, capacitors and inductors.
A web-based registration and cashiering system : You work for a large public university that utilizes a web-based registration and cashiering system that allows students to register for, pay for, and drop classes
Calculate the magnetic braking force : Consider a bar (L=3.00m) is sliding to the right on 2 rails with a velocity (0.75 m/s) towards a resistor (20 ohms), calculate the "Magnetic Braking force"
What will the price of this bond be : A $1,000 bond has a coupon rate of 10 percent and matures after 8 years. Interest rates are currently 7%.
Explain nitric acid is usually purchased in a concentrated : Nitric acid is usually purchased in a concentrated form that is 70.3% HNO3 by mass and has a density of 1.41 g/mL. How much concentrated solution would you take to prepare
How many input lines are needed for a 128- to-1 multiplexer : a) The input of Hex- to - seven segment decoder is 1010. what will the display show b) A priority encoder has all inputs activated. Which input will be encoded. Why c) how many select input lines are needed for a 128- to - 1 multiplexer

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd