Denial-of-Service Denial-of-Service
Denial of Service
Answer the following questions in a Microsoft® Word document and save the file on your computer with your last name in the file. (Example: module_05_projects_Jones.doc) The computer lab of a local college needs a one-page document that it will distribute to its incoming students to increase their security awareness. After reading the information presented in this module and other sources, prepare a document, which should include a 10-item bullet list of the things that students must remember to reduce the risks of using information technology. After reading the information presented in this module and other sources, write a one-page paper about three high-profile companies that faced security breaches in the last two years. Identify two vulnerabilities that enabled hackers to break into these companies systems. Denial of service (DoS) is among the security threats that have been on the rise in recent years. After reading the information presented in this module and other sources, write a one-page paper that outlines four recommendations for dealing with this security threat. Cite three U.S. companies that have been among the victims of this security threat. What is the relationship between DDoS and IoT devices? Discuss. After reading the information presented in this module and other sources, write a one-page paper that lists three antivirus software applications; include one advantage and one disadvantage of each. Which one do you recommend for the student lab mentioned in Project 1? What are the bases for your recommendation? Is antivirus software alone sufficient to protect the security of a network? Why and why not? After reading the information presented in this module and other sources, write a one-page paper that identifies three companies (in addition to those mentioned in this book) that are using biometric security measures for authentication. Why has each company chosen this alternative over other security measures? What are two advantages and two disadvantages of biometrics as a security measure? After reading the information presented in this module and other sources, write a two-page paper that offers five recommendations for improving the security of online transactions. List two companies that provide preventive measures for e-commerce sites. What are included in their offerings? What are the costs? When you purchase from online businesses, how do you know that a Web site is secure? For more information on Denial of Service read this: https://en.wikipedia.org/wiki/Denial_of_Service
Denial-of-Service
5.33 Suppose a denial-of-service attack shuts down two dozen major websites, including retailers, stock brokerages, and large corporate entertainment and information sites, for several hours. The attack is traced to one of the following perpetrators. Do you think different penalties are appropriate, depending on which it is? Explain why. If you would impose different penalties, how would they differ? (a) A foreign terrorist who launched the attack to cause billions of dollars in damage to the U.S. economy. (b) An organization publicizing its opposition to the commercialization of the Web and corporate manipulation of consumers. (c) A teenager using hacking tools he found on a website. (d) A hacker group showing off to another hacker group about how many sites it could shut down in one day. 6.27 The ECPA does not prohibit universities from reading student email on its computers, just as it does not prohibit businesses from reading employee email on company computers. Find your universitys policy about access to student computer accounts and email (on university computers) by professors and university administrators. Describe the policy. Tell me what parts you think are good and what should change. 6.28 Find a decision made in a lawsuit by an employee who was fired because of photos or other material the employer found on the employees social network pages. Summarize the case and the result. Do you think the result was reasonable? Why? For more information on Denial-of-Service read this: https://en.wikipedia.org/wiki/Denial-of-service_attack
Use Promo Code: FIRST15