Reference no: EM133749880
Question: A Denial of Service (DOS) attack typically involves the misuse of standard TCP/IP protocols or connection processes so that the target for the DOS attack responds in a way designed to create maximum trouble. Read the TECHNICAL FOCUS 11-2 "Inside a DoS Attack" on page 307 and become familiar with the five common types of TCP/IP attacks.
Select one attack method and conduct research using the Internet and libraries available through your Cougar-Track account to develop a 900-1000-word (approximately 4 double space pages) narrative of an actual attack which used the method you selected.
Use the following list of significant points to consider as you create your paper.
Why was the target selected? (For social, political, financial reasons?)
What was the target's network security posture prior to the attack? (Passively/Actively protected, indifferent about cyber security?)
What was the loss to the target? (Information, financial data, customer/personal information?)
What secondary impact did the attack have, and to whom? (Banks, investments, suppliers etc.)
Identify the person or organization that claimed responsibility for the attack. In your own words, describe why you believe they performed the attack.