ITM 820 Lecture Notes - Lecture 4: Denial-Of-Service Attack

15 views1 pages

Document Summary

What steps should be taken when a dos or ddos attack is detected? s to prevent your systems from being compromised. This requires good system security practices and keeping the operating systems and applications on such systems current and patched. There are generally six steps that should be taken when a ddos attack is detected. The first step is to conduct an enterprise risk assessment. This is an essential step as it allows users to see the impact that attack would have on their system. Also, it allows users to estimate how much possible damage they would incur from this attack. Damages can vary from damaging an organization s reputation for example, to communication being shut down. The second step is to create an action plan. This allows the user to proactively prepare for the attackers next move because once the user is under the ddos attack, its too late to define responses.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents