can someone help with this assignment Briefly respond to all following questions
ID: 3874405 • Letter: C
Question
can someone help with this assignment
Briefly respond to all following questions. Make sure to explain and backup your response with facts and examples. This assignment should be in APA format and have to include at least two references. 1) What is a spoofing attack? 2) Briefly provide two common types of spoofing attacks executed by adversaries to attack access control. 3) What is a Denial of Service attack? How does it function? 4) List two real Denial of service Attacks that occurred in the last few years. (Make sure to include references) 5) What is an attack tree? 6) Provide an attack tree for cheating on a final exam for this course.
Explanation / Answer
If you have any problem with the answer just write it in the comment and if you like the answer just upvote.
1.) spoofing attack is when a malicious program or person impersonates as another device by falsifying data and thus gaining advantage against the host network and can attack it.
2.) There are total three types of spoofing attacks DNS, ARP and IP spoofing attacks
a.) DNS spoofing attack - In DNS spoofing attacking a malicious attacker reroutes the DNS translation so that it points to a different server which is usually infected with malware and can be used to spread virus and worms.
b.) IP spoofing attack - In IP spoofing attack, a malicious attacker copies a legitimate IP address and send out IP packets using a trusted IP address which forces systems to believe the source is trustworthy, thus leaving system vulnerable using the ‘trusted’ IP packets.
3.) In DOS attack, the targeted machine is flooded with superfluous request and making it impossible for legitimate user to use the machine, thus making the machine unavailable for request.
4.) a.CLINTON AND TRUMP CAMPAIGN SITES- hacker group anonymous launched dos attacks against both trump and Hilary Clinton during 2016.
b. RIO OLYMPICS- during the start of 2015, many dos attack were launched against the official site of Rio Olympic.
(references - https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/5-significant-ddos-attacks-2016/)
5.) Attack tree are conceptual diagram providing a formal way to describe the security of system and how they can be attacked. Attacks against a system are represented on a tree structure with goal being the root node and different ways to achieve as leaf nodes.
6.) sorry I don't know your course so won't be able to make a attack tree.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.