Performance of the isp during the ddos attack

Assignment Help Other Subject
Reference no: EM132439732

You've publicized the attack to your other nation teams, your team has determined that all the nation teams were under DDoS attack, and they sustained latency or even unavailability of their networks. Now the CIOs have directed that the service-level agreements (SLAs) be reviewed on what the attack means to cost and services rendered. Technologically trained professionals increase their marketability and hireability when they are able to demonstrate business acumen as well as technical expertise. And with more integrated environments following services on-demand structures such as cloud computing, it is imperative that cybersecurity professionals be able to assess if their organization is getting what it paid for.

You may have determined a network topology for your nation team, or you may have researched a network topology and are using that to base your analysis, citing the researched information using APA format. In these topologies, you will research what are the operating system vulnerabilities (operating system fundamentals, operating system protections). You will identify requirements for operating system security to address these vulnerabilities.

You will then formulate a service-level agreement to mitigate the vulnerabilities, particularly for DDoS activities.

Produce a three- to five-page Service-Level Agreement (SLA) that you believe is best to serve the nation teams' security protections. If you research sample SLAs, provide citations.

Include:
• an agreement not to engage in testing DDoS without notifying the Internet service provider (ISP)
• metrics for availability
• bandwidth requirements
• monitoring from the ISP's network
• traffic reports to be received and access to ISP information on net defense and best practices
• testing nations' teams configurations by ISP
• other components needed to fulfill your nation team's requirements

Perform an evaluation of the SLA that you created, and in a checklist format, report on the performance of the ISP during the DDoS attack. Conduct independent research if a checklist example is needed. If you model your checklist after an existing resource, cite and reference using APA format. Estimate costs of services or any compensation owed to the nation team. Include written justification to the ISP for the downtime due to DDoS. This evaluation is included in the three- to five-page requirement.

Your designated team member should submit the SLA for review and feedback. In the next step, you will take on "packet sniffing" in the lab, as you move to a digital forensics role in the investigation.

Verified Expert

The DDOS (Distributed Denial of Service), generally happens when there is unwanted attacks of viruses and malware in systems.The report has explained the usefulness of operating system to protect the system hardware, and topology and then provided a detailed service level agreement (SLA),to understand the agreement between a customer and a service provider.

Reference no: EM132439732

Questions Cloud

Explain the role that elevated postprandial insulin : Explain the role that elevated postprandial insulin plays in contributing to increased hepatic denovo lipogenesis in response to a high carbohydrate meal.
Why is ketogenesis beneficial in a starvation state : Explain how and why the liver engages in a high rate of ketogenesis during a starvation state and then identify the fate of the ketones synthesized in the liver
How would translation be affected and the resulting proteins : UGU is mutated so that the tRNA recognizes the UAG codon but still carries a cysteine residue, how would translation be affected and the resulting proteins?
Uses 2 atp and produces 4 atp per glucose molecule : Which part of cellular respiration uses 2 ATP and produces 4 ATP per glucose molecule? Where does this set of reactions occur in the cell?
Performance of the isp during the ddos attack : Perform an evaluation of the SLA that you created, and in a checklist format, report on the performance of the ISP during the DDoS attack. Conduct independent
Find a gap in the story : Task - The novel "The Great Gasby" and find a gap in the story. You will then have to write a narrative that fill in that gap
Alkaline phosphatase enzyme kinetic experiment : Assume the [PNP] dilutions were accurate. Any other things to improve the standard curve measurement? In other words, what are other error sources?
Matrix create two types of forces : Does the higher H+ conc. in the intermembrane vs the matrix create two types of forces? Are they the proton motive force and electrochemical force?
Secondary and tertiary structures : What interaction causes RNA to form secondary and tertiary structures. Give two examples of RNA (use tRNA and rRNA) that have secondary and tertiary structures

Reviews

Write a Review

Other Subject Questions & Answers

  Analysis of results from simulation models

This unit we are using simulation models to investigate the behaviour of critical performance variables, such as profit, in the presence of uncertainty.

  What was the problem that the policy was devised to address

Provide a short history of the problem that the policy seeks to address: This should be several paragraphs in length to close to a page with references. Also, provide a history of how the policy came into existence e.g. The affordable care act ..

  Create objectives for capstone project using smart format

Locate and summarize content of 2 articles on the use of SMART goals/objectives: what they are, how they are used, and why they are effective.

  Piaget theory of cognitive development

Piaget's theory of cognitive development is one of the most widely used cognitive theories.

  The course objectives for nursing theory

Write a brief reflection of his/her thoughts regarding the course objectives for Nursing Theory.

  Acts of terrorism

Acts of terrorism are intended to have an impact far beyond the death and destruction of the immediate attack. Mass fear and interruptions to normal daily functioning occur in the aftermath of terrorist attacks, like concentric surges that erupt w..

  Way as a 20-year-old sophomore

Suppose a 70-year-old entered college and started acting exactly the same way as a 20-year-old sophomore.

  Why is end of life planning important

Why is end of life planning important? What benefits does it to provide to one who is dying and to the survivors? Discuss why end of life planning could be important to you at this present time

  What has changed over time that has affected role of unions

Do you believe there was a strong need for unions during this time period? Does the same need exist today? What has changed over time that has affected the role of unions in society?

  Why is software quality assurance important

Why is software quality assurance important in system development -  What are some of the software quality assurance methods that you would embrace for ensuring quality in the application that you are developing, and why?

  Describe at least two potential solutions to social issue

Describe at least two potential solutions to the social issue. What are the key steps involved with each potential solution? Are the potential solutions feasible? Explain

  Describes some of the issues and problems faced by a member

Construct a case study that describes some of the issues and problems faced by a member of a vulnerable group.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd