MIS 301 Chapter Notes - Chapter 13: Syn Flood, Dumpster Diving, Denial-Of-Service Attack

27 views2 pages
Chapter 13: “Information Security: Barbarians at the Gateway (and just about everywhere else)
3 things companies need to do (PPT):
Determine potential threats, evaluate risks of potential threats, manage potential threats
Biometrics: technologies that measure and analyze human body characteristics for identification or
Example: fingerprint readers, retina scanners, voice and face recognition, etc
Goal is to be a better solution for good passwords
Brute-force attack: an attack that exhausts all possible password combinations in order to break into an
account; the larger and more complicated as password or key, the longer a brute-force attack will take
The largest attacks are still unable to compromise information in banks or on shopping sites
Compliance: some firms are bound by security compliance commitments and will face fines and retribution if
they fail to meet the commitments
HOWEVER, compliance does NOT equal security
Control: reduce likelihood/impact of security threats
Distributed Denial of Service (DDoS) attack: an attack where a firm’s computer systems are flooded with
thousands of seemingly legitimate requests
The volume of the attack itself can slow down or shut down the site’s use.
Usually performed using botnets or hordes of surreptitiously infiltrated computers, linked and
controlled remotely (zombie networks)
Syn-Ack attack/three way handshake:
Normally when a client attempts to start a TCP connection to a server, the client and server exchange a series
of messages which normally runs like this:
1. The client requests a connection by sending a SYN (synchronize) message to the server.
2. The server acknowledges this request by sending SYN-ACK back to the client.
3. The client responds with an ACK, and the connection is established.
4. This is called the TCP three-way handshake, and is the foundation for every connection established
using the TCP protocol.
A SYN flood attack works by not responding to the server with the expected ACK code. The malicious client
can either simply not send the expected ACK, or by spoofing the source IP address in the SYN, causing
the server to send the SYN-ACK to a falsified IP address - which will not send an ACK because it
"knows" that it never sent a SYN.
Dumpster diving: combing through trash to identify valuable assets
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows half of the first page of the document.
Unlock all 2 pages and 3 million more documents.

Already have an account? Log in

Get OneClass Notes+

Unlimited access to class notes and textbook notes.

YearlyBest Value
75% OFF
$8 USD/m
$30 USD/m
You will be charged $96 USD upfront and auto renewed at the end of each cycle. You may cancel anytime under Payment Settings. For more information, see our Terms and Privacy.
Payments are encrypted using 256-bit SSL. Powered by Stripe.