This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Ip sweep attack

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

 

 

 

 

 

6.3 Assignment 5

 

Student’s Name

Instructor’s Name

Course Number

Due Date

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

6.3 Assignment 5

1.

Ip sweep attack refers to a category of attack that usually happens when the attacker sends pings or ICMP echo requests to numerous destination addresses. In contrast, portsweeep attack refers to a scenario where numerous hosts are usually scanned for a given listening port.

A buffer overflow attack operation takes place when a given program attempts to fill the memory buffer or the memory block with additional data more than the capacity the buffer was recommended to carry.

The DoS attacks refer to attacks that normally shuts down a network or a machine, turning it inaccessible to its users. They usually execute this action through overfilling the targets with traffic or by sending information triggering a crash. An example of this attack is the Buffer overflow attack. On the other hand, DDoS attack refers to malicious trials aimed at disrupting targeted traffic or servers or a network by overwhelming the server and the encompassing infrastructure with overfill of internet server or traffic. An example of this attack is SYN flooding and UDP flooding.

3.

Routing attacks refers to attacks that usually takes advantage of the protocols vulnerabilities, the weak authentications, and the inconsistencies experienced in the router software. Two examples of routing attacks are Hit and Run (HAR) or the Persistent Attacks (PA).

A characteristic of the HAR attack is that they are usually easy to spot since the attacked router will start by showing unusual activities external to the normal routine. While PA attacks are usually persistent in nature.

4.

The countermeasures that would be recommended as a defense against these types of network activity include creating a strong network change regularly and network password (Attacks”, 2020). Secondly, the countermeasure can be achieved through deleting suspicious don’t clicks and emails. Other measures include the application of data encryption and antivirus software.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Attacks”, “. (2020, April 3). TYpes of network attacks and prevention techniques. Cyber Threat: https://cyberthreatportal.com/types-of-network-attacks-and-prevention/

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask