This website uses cookies to ensure you have the best experience. Learn more

Incident Handling Process Of A D Do S Attack

1797 words - 7 pages

Though the phrase “hacker” has been popularized over the last twenty years largely due to corporate data breaches and pop-culture references, most people outside the security community are unaware that the term does not accurately describe all types of cyber adversaries. There are different classes of hackers, most often differentiated by skill level and motivations for placing attacks. A more correct label for identifying Internet activists performing malicious actions such as those associated with the WikiLeaks movement is “hacktivists”.

Hacktivists are hackers specifically motivated to attack technological systems or organizations as a result of differing viewpoints on social or political issues (US Army, 2005, p. 37). Though most hacktivist driven cyber-attacks take form through digital vandalism or simple webpage defacement, more extreme incidents have involved large-scale distributed denial of service (DDoS) attacks knocking target organizations offline for extended periods of time. One of the most popular and well-developed hacktivist organizations is called “Anonymous”.

Anonymous was recently popularized in the mainstream media after it placed several DDoS attacks on Egyptian government resources after the nation’s leaders blocked Twitter access to pro-democracy protestors back in January (Wagenseil, 2011). The hacktivists of Anonymous also defended Wikileaks by attacking organizations such as MasterCard and PayPal after the financial institutions prohibited monetary contributions from the public to the revolutionary wiki site. (Mills, 2011). More recently, Anonymous has set its sights on the Iranian government through “Operation Iran”. The effort is currently targeting critical Iranian resources with DDoS attacks as a result of the social injustices the Iranian citizens have endured over the last several years at the hands of their anti-democratic government (Mills, 2011).

When compared to the traditional hacker, hacktivists are extremely similar. Both types of adversary use similar toolkits and attack mechanisms in order to subvert their opponent’s technological systems. Additionally, both hackers and hacktivists prefer to keep their true identities hidden from the public, doing most of their work under aliases or monikers. The primary difference between hackers and hacktivists is the motivation for targeting opponents and placing attacks. Traditional hackers are often motivated by earning fame or money for placing successful attacks on highly visible organizations or systems. Hacktivists are not fueled by money or fame, but rather aim to conquer parties responsible for inflicting social injustices upon a given community, or at revealing hidden “truths” to the global community.

As previously mentioned, MasterCard and PayPal were both targeted by the hacktivist organization Anonymous during “Operation Payback”. Both organization’s websites were targeted with DDoS attacks as a result of preventing WikiLeaks...

Find Another Essay On Incident Handling Process of a DDoS Attack

People Having a High Percentage of Heart Attack

761 words - 4 pages caused by blood clotting, severe emotional stress and physical exhaustion. One of the causes of heart attack is by blood clotting. Blood clotting, or coagulation, is an important process that prevents excessive bleeding when a blood vessel is injured. Blood clotting can be dangerous if it is in the heart's veins and arteries, which then leads to a heart attack. Fast food is connected with blood clots and heart attacks; That is because

Analysis of a Classroom Incident Involving Cultural Insensitivity

1274 words - 6 pages . Recommendations 1. Recommendations for the parties Ideally, the teacher in this scenario should have used this opportunity to help inform both students about what it truly means to be accepting of other cultures. Approaching this situation with a relativistic (to an extent) viewpoint would be one of the best methods for handling this incident. It allows for consideration to both sides of the argument without being biased to any one party

A Comparison of the Attack on Pearl Harbor and the Terroist Attacks of September 11th, 2001

1287 words - 6 pages The events of December 7th1941 on Pearl Harbor are ones that along with many others will forever remain written down as a historic day in not just in history but in naval and military history as well. In this essay I will first explain and describe the Pearl Harbor attack. I will do that in the perspective of a male veteran who at the time was stationed at Pearl Harbor as a U.S. Navy cadet describing the events of that topic to a news anchor

Keeping Your Business Running in the event of a criminal attack: Prevention, Protection & Continuity measures

5650 words - 23 pages with hardware, communication links, power etc being readily available. In the event of an incident, the warm standby/site can be activated, and servers can be brought online fairly quickly.From then, data restores and software updates will be required. In this instance, in the event of an attack that requires the invocation of a warm standby server or site, resources will be mobilised to go to the site, and bring the services back online.Hot

A cross-cultural comparison of political attack ads in Brazil and the United States

3206 words - 13 pages political process. People process negative information faster than positive information, making that information salient" (Gunsch, Brownlow & Haynes & Mabe, 2000).The great majority of authors argue that attack advertising is better recalled, though some mention the existence of a backlash effect against the sponsor or a "victimization phenomenon" favoring the attacked candidate (Gunsch, Brownlown & Mabe, 2000). Other scholars state that

The "Kaohsiung Incident" Of 1979 A Turning Point In Taiwan's History

2740 words - 11 pages " magazines and were criticizing the KMT authorities handling of the incident. As I was not familiar with the tangwai magazines, I initially did not quite believe what my friends told me.Then one of them told us a shocking story: He said that at the time of the Kaohsiung Incident, his cousin, who was serving in the military police, was member of a unit which was ordered to dress up like civilians and to beat up the uniformed military police in

The importance of preserving a crime/incident scene cannot be understated. Describe and explain the critical steps required by the first attending officer at the crime/incident scene

1764 words - 7 pages A first officer attending a crime scene or incident has to perform a number of critical steps as part of the preliminary investigation. These steps include preserving life, assessing the scene, protecting evidence, managing people at the scene, summoning assistance, securing the scene, guarding the scene and recording a log in their notebook. Underpinning all these important steps, a first attending officer's primary consideration (after

"The Idea Of Mutually Assured Destruction As A Reason For Superpowers Not To Attack Each Other"

655 words - 3 pages The basis for no nuclear strikes between the two superpowers was that there existed a psychology known as Mutually Assured Destruction (MAD). This was the philosophy that both nations understood. They both knew that they held the power to destroy each other completely in the event of an attack. This struck fear in the hearts of both nations, causing little reaction to the current situation. This theory was based on three different ideas. One

The Process of Designing a Truck Bed

1102 words - 4 pages Summary The objective for this lab was for each individual to make a truck bed from a 1010 steel metal sheet. The individual would learn the process of bending the the metal, designing a shape based on dimensions, and shearing off parts that lack purpose in the design. This process of designing the truck bed takes time, precision, and carefulness. From this process one learns the basics of forming, and all the basic equipment required to

Process of Designing a Decent Website

1061 words - 5 pages So you decided to make a website huh? good, because your in the right place. I'm going to explain the different steps in the website design and development process. What is a development process? Luke Reimer from Smashing magazine answers “A Web development process is a documented outline of the steps needed to be taken from start to finish in order to complete a typical Web design project”. There are numerous steps in the web site design

A Dilemma of the Jury Selection Process?

1875 words - 8 pages Have you ever been asked to serve as a jury member? Usually, most people have a negative feeling toward juror duty. Some of them might lack a full understanding of the important role of the jury, as they are not specialists in this professional field. The jury selection process also causes people to be impatient because, once prospective jurors are summoned in order to verify their impartiality, they have to be examined by both judges and

Similar Essays

Effects And Complications Of A Heart Attack

1052 words - 4 pages choices can cause the disease, these include; being overweight due to bad eating habits, physical inactivity, unhealthy diet, smoking, high blood pressure and a less common cause is an aneurysm which is A heart attack is caused by plaque in the coronary arteries being accumulated to the point where blood flow is prevented or the formation of a blood clot in an artery already narrowed by arteriosclerosis, arteriosclerosis is a process in which fatty

Chest Pains Of A Heart Attack

927 words - 4 pages Heart attack, a common symptom of a cardiovascular disease is a very dangerous and fatal disease. Specifically a heart attack is when the coronary artery to the heart is blocked by a plague that's built up in the veins, thus stopping the blood flow to the heart, and can lead to heart muscle cell death. Notoriously known to affect people of an older variety, and the number one killer in the world. Heart attacks are a disease to be extremely wary

The Aftermath Of A Bioterrorist Attack

861 words - 4 pages The aftermath of a bioterrorist attack can be catastrophic to the population in any affected country. The effects can be medical, economic, political, psychological, and social, depending on what agent is used, and the conditions of its release. If the agent is professional prepared and released then the effects could be more both significant and long lasting, and although an attack can affect a country in a disruptive manner, it could also

A Comparison Of The September 11 Attack And The Attack On Pearl Harbor

577 words - 2 pages There are many similarities and differences between the Japanese attack on Pearl Harbor and the terrorist attacks of September 11, 2001. One attack was committed by terrorists and the other was committed by a government. After Pearl Harbor, we entered a world war, and after the terrorist attacks, we invaded another country. Both Attacks were grave threats to our national security. To begin, the two attacks were launched by different types of