"Screw this, I'm gonna use paper instead."
DOS Attack
Symantec Guide to Scary Internet StuffAlso known as a Denial of Service attack. This attack involves using up the computer or network resources so that it cannot be used by other users. For example, an attacker decides to send multiple packets to a network server, causing it to overload and in the end, it will stopped working properly. In the end, users will not be able to access the data information stored in the server.
Solutions to DOS attacks
Although we cannot predict when a DOS attack will occur, we can still prevent it from happening. One such way is to implement data traffic limit in the network. By doing so, any tell-tale signs of a DOS attack such as sudden flood of data packets will be stopped.IP Address Spoofing
Imagine this scenario: A man walks into a company and steals an ID badge that belongs to an employee of the company. With that badge, he can access parts of the company resources whichever he likes. How would the employee feel when the blame is pin-pointed to him when he is not the one doing the dirty deed?
Similarly in the digital world, this can be done when a person masquerades as a trusted user of a network by changing his IP address to the trusted user's IP address. This way, he can gain access to the network as the trusted user.
Solutions to IP Spoofing
Just like an DOS attack, we have no idea when an intrusion using this method will occur. But we can prevent IP spoofing through various methods such as filtering both inbound and outbound traffic occurring in the network. Another way is to configure the routers and switches to reject packets that enter the network which claims to originate from within the network.Alright, I shall start on a new post tomorrow on security policies. Have a great day ahead everyone!
From your post about networking threats and solutions, I have learned more about these threats and the solutions to them. Firstly, I have understood more about DoS attack, also known as a Denial of Service attack, which uses the computer or network resources so that it is unable to be used by other users. Secondly, I have understood more about IP Address Spoofing, which is when a user masquerades as a trusted user of a network by changing his IP address to the trusted user's IP address to gain access to the network. With the necessary precautions taken, the occurrences of these threats will be considerably reduced.
ReplyDeleteTo OP:
ReplyDeleteGreat job adding in the images that lightens up the whole document. The DoS Solution that you have currently stated does not work on a larger scale DoS, only effective for a small scale DoS. Whistle there is no single way to stop a large scale DoS or even a DDoS, it is possible to minimize the effect through the use of backup. In the case of which a web server (I.E Yahoo!) is being DoS or DDoS'd, immediately when the first server is taken offline, a second server will take its place, using a totally different IP from the first server, thus allowing for less downtime. Nevertheless, good work on the explanations!
Kudos,
Zhi Yao
This blog post explains the common network attacks as well as security policies well as examples are included at the end in order to allow the reader to understand it better. Things like scenarios in which the user can relate to are included in as well which I believe makes it a good blog post as the blogger has put himself into the reader’s shoe and tried to explain it in a manner the users would be able to understand. Pictures have also been included into the blog post which even though might not help the user understand the situation better but it makes the post much less duller and keeps the user awake as the blog post is not all about all the technical IT stuffs.
ReplyDelete-Amos Lee
This comment has been removed by the author.
ReplyDelete