• Home
  • Blog
  • CISS 302 Bethesda University Business Data Communications and Networking Paper

CISS 302 Bethesda University Business Data Communications and Networking Paper

0 comments

For this exercise, you will perform research and develop a brief paper on the subject described below.

A Denial of Service (DOS) attack typically involves the misuse of standard TCP/IP protocols or connection processes so that the target for the DOS attack responds in a way designed to create maximum trouble. Read the TECHNICAL FOCUS 11-2 “Inside a DoS Attack” on page 299 and become familiar with the five common types of TCP/IP attacks.

Select one attack method and conduct research using the Internet and libraries available through your Cougar-Track account to develop a 900-1000-word (approximately 4 single-space pages) narrative of an actual attack that used the method you selected.

Use the following list of significant points to consider as you create your paper.

  1. Why was the target selected? (For social, political, financial reasons?)
  2. What was the target’s network security posture prior to the attack? (Passively/Actively protected, indifferent about cybersecurity?)
  3. What was the loss to the target? (Information, financial data, customer/personal information?)
  4. What secondary impact did the attack have, and to whom? (Banks, investments, suppliers, etc.)
  5. Identify the person or organization that claimed responsibility for the attack. In your own words, describe why you believe they performed the attack.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}