SlideShare a Scribd company logo
1 of 1
Download to read offline
An unknown individual launches a series of attacks against the Web sites of Prime Sales
Corporation. The attacks significantly slow the sites, leading to $100 million in damage in terms
of lost work time, lost revenue, site repair costs, and other expenses. The attacker does not intend
to profit from the onslaught and in fact does not realize any financial benefit from the effects.
How is this attack most likely orchestrated? Who is most likely to engage in this act—that is,
whose habits and limitations are clearly suited to such conduct—and why?
Solution
Most probably the website is slowed by a DDOS (Distributed Denial of Service) attack. In this
attack the hacker sends multiple fake requests from different servers with the intention of
slowing down the service to legitimate users. The most likely suspect is an anonymous hacking
group. These groups are formed by professional hackers who come together for a common cause.
The most likely reason might to gain attention or the group considers something the company is
doing as against their beliefs.

More Related Content

Similar to An unknown individual launches a series of attacks against the Web s.pdf

Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
anjandavid
 
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER:  The Continued rise of DDoS AttacksTECHNICAL WHITE PAPER:  The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
Symantec
 

Similar to An unknown individual launches a series of attacks against the Web s.pdf (20)

Web Attack Survival Guide
Web Attack Survival GuideWeb Attack Survival Guide
Web Attack Survival Guide
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 
Website Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your WebsiteWebsite Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your Website
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
 
DDoS Hurts Everyone
DDoS Hurts EveryoneDDoS Hurts Everyone
DDoS Hurts Everyone
 
Why Security Matters for Marketers
Why Security Matters for MarketersWhy Security Matters for Marketers
Why Security Matters for Marketers
 
Know _ Top 7 Cyber Security threat.pptx
Know _ Top 7 Cyber Security threat.pptxKnow _ Top 7 Cyber Security threat.pptx
Know _ Top 7 Cyber Security threat.pptx
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
Phishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesPhishing attack types and mitigation strategies
Phishing attack types and mitigation strategies
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Amazon & E Bay
Amazon & E BayAmazon & E Bay
Amazon & E Bay
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
 
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER:  The Continued rise of DDoS AttacksTECHNICAL WHITE PAPER:  The Continued rise of DDoS Attacks
TECHNICAL WHITE PAPER: The Continued rise of DDoS Attacks
 
Linux- Anti reconnaissance
Linux- Anti reconnaissanceLinux- Anti reconnaissance
Linux- Anti reconnaissance
 
Know _ Top 7 Cyber Security threat.pdf
Know _ Top 7 Cyber Security threat.pdfKnow _ Top 7 Cyber Security threat.pdf
Know _ Top 7 Cyber Security threat.pdf
 
Cyber Law Course Online With Certification LedX.pdf
Cyber Law Course Online With Certification  LedX.pdfCyber Law Course Online With Certification  LedX.pdf
Cyber Law Course Online With Certification LedX.pdf
 

More from deepaarora22

Helen Bowers was stumped. Sitting in her office at the plant, she po.pdf
Helen Bowers was stumped. Sitting in her office at the plant, she po.pdfHelen Bowers was stumped. Sitting in her office at the plant, she po.pdf
Helen Bowers was stumped. Sitting in her office at the plant, she po.pdf
deepaarora22
 
Darwin was not the first to consider evolution as a processes but.pdf
Darwin was not the first to consider evolution as a processes but.pdfDarwin was not the first to consider evolution as a processes but.pdf
Darwin was not the first to consider evolution as a processes but.pdf
deepaarora22
 
Consider the following pedigree, which traces the inheritance of a si.pdf
Consider the following pedigree, which traces the inheritance of a si.pdfConsider the following pedigree, which traces the inheritance of a si.pdf
Consider the following pedigree, which traces the inheritance of a si.pdf
deepaarora22
 
A mutant strain of E. coli is found that produces both beta-galactos.pdf
A mutant strain of E. coli is found that produces both beta-galactos.pdfA mutant strain of E. coli is found that produces both beta-galactos.pdf
A mutant strain of E. coli is found that produces both beta-galactos.pdf
deepaarora22
 
What are the difference between the testes of a frog and a rat in te.pdf
What are the difference between the testes of a frog and a rat in te.pdfWhat are the difference between the testes of a frog and a rat in te.pdf
What are the difference between the testes of a frog and a rat in te.pdf
deepaarora22
 
What are the basic differences and commonalties between Structured An.pdf
What are the basic differences and commonalties between Structured An.pdfWhat are the basic differences and commonalties between Structured An.pdf
What are the basic differences and commonalties between Structured An.pdf
deepaarora22
 

More from deepaarora22 (20)

How did the tail of the swordtail fish evolveSolutionThe swor.pdf
How did the tail of the swordtail fish evolveSolutionThe swor.pdfHow did the tail of the swordtail fish evolveSolutionThe swor.pdf
How did the tail of the swordtail fish evolveSolutionThe swor.pdf
 
Helen Bowers was stumped. Sitting in her office at the plant, she po.pdf
Helen Bowers was stumped. Sitting in her office at the plant, she po.pdfHelen Bowers was stumped. Sitting in her office at the plant, she po.pdf
Helen Bowers was stumped. Sitting in her office at the plant, she po.pdf
 
Dr. A. conducts a study on the effect of distraction on learning. Dr.pdf
Dr. A. conducts a study on the effect of distraction on learning. Dr.pdfDr. A. conducts a study on the effect of distraction on learning. Dr.pdf
Dr. A. conducts a study on the effect of distraction on learning. Dr.pdf
 
Discuss the function and importance of conceptual modeling.Solut.pdf
Discuss the function and importance of conceptual modeling.Solut.pdfDiscuss the function and importance of conceptual modeling.Solut.pdf
Discuss the function and importance of conceptual modeling.Solut.pdf
 
Dave threw a ball into the air while standing on a 10 foot tall tabl.pdf
Dave threw a ball into the air while standing on a 10 foot tall tabl.pdfDave threw a ball into the air while standing on a 10 foot tall tabl.pdf
Dave threw a ball into the air while standing on a 10 foot tall tabl.pdf
 
Darwin was not the first to consider evolution as a processes but.pdf
Darwin was not the first to consider evolution as a processes but.pdfDarwin was not the first to consider evolution as a processes but.pdf
Darwin was not the first to consider evolution as a processes but.pdf
 
Consider the following pedigree, which traces the inheritance of a si.pdf
Consider the following pedigree, which traces the inheritance of a si.pdfConsider the following pedigree, which traces the inheritance of a si.pdf
Consider the following pedigree, which traces the inheritance of a si.pdf
 
Can heat flow through an object whilst it remains at a steady temper.pdf
Can heat flow through an object whilst it remains at a steady temper.pdfCan heat flow through an object whilst it remains at a steady temper.pdf
Can heat flow through an object whilst it remains at a steady temper.pdf
 
A mutant strain of E. coli is found that produces both beta-galactos.pdf
A mutant strain of E. coli is found that produces both beta-galactos.pdfA mutant strain of E. coli is found that produces both beta-galactos.pdf
A mutant strain of E. coli is found that produces both beta-galactos.pdf
 
Youve completed an interrupted mating experiment in E. coli, the l.pdf
Youve completed an interrupted mating experiment in E. coli, the  l.pdfYouve completed an interrupted mating experiment in E. coli, the  l.pdf
Youve completed an interrupted mating experiment in E. coli, the l.pdf
 
Write the following Scheme functions in JavaSolutionimport ja.pdf
Write the following Scheme functions in JavaSolutionimport ja.pdfWrite the following Scheme functions in JavaSolutionimport ja.pdf
Write the following Scheme functions in JavaSolutionimport ja.pdf
 
Write a C program to enter a first name, middle name and last name i.pdf
Write a C program to enter a first name, middle name and last name i.pdfWrite a C program to enter a first name, middle name and last name i.pdf
Write a C program to enter a first name, middle name and last name i.pdf
 
Why do the soft technologies open more opportunities for women To w.pdf
Why do the soft technologies open more opportunities for women To w.pdfWhy do the soft technologies open more opportunities for women To w.pdf
Why do the soft technologies open more opportunities for women To w.pdf
 
What are the difference between the testes of a frog and a rat in te.pdf
What are the difference between the testes of a frog and a rat in te.pdfWhat are the difference between the testes of a frog and a rat in te.pdf
What are the difference between the testes of a frog and a rat in te.pdf
 
Which of the following occurs with disruptive selectiona. Natural .pdf
Which of the following occurs with disruptive selectiona. Natural .pdfWhich of the following occurs with disruptive selectiona. Natural .pdf
Which of the following occurs with disruptive selectiona. Natural .pdf
 
When comparing replicate populations of plants that are grown in the .pdf
When comparing replicate populations of plants that are grown in the .pdfWhen comparing replicate populations of plants that are grown in the .pdf
When comparing replicate populations of plants that are grown in the .pdf
 
What is wrong with the following definition of headInsertstruct N.pdf
What is wrong with the following definition of headInsertstruct N.pdfWhat is wrong with the following definition of headInsertstruct N.pdf
What is wrong with the following definition of headInsertstruct N.pdf
 
What is the BEST way to determine if there are any gaps in your thes.pdf
What is the BEST way to determine if there are any gaps in your thes.pdfWhat is the BEST way to determine if there are any gaps in your thes.pdf
What is the BEST way to determine if there are any gaps in your thes.pdf
 
What are two specialized epidermal cells and what do they do for the.pdf
What are two specialized epidermal cells and what do they do for the.pdfWhat are two specialized epidermal cells and what do they do for the.pdf
What are two specialized epidermal cells and what do they do for the.pdf
 
What are the basic differences and commonalties between Structured An.pdf
What are the basic differences and commonalties between Structured An.pdfWhat are the basic differences and commonalties between Structured An.pdf
What are the basic differences and commonalties between Structured An.pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

An unknown individual launches a series of attacks against the Web s.pdf

  • 1. An unknown individual launches a series of attacks against the Web sites of Prime Sales Corporation. The attacks significantly slow the sites, leading to $100 million in damage in terms of lost work time, lost revenue, site repair costs, and other expenses. The attacker does not intend to profit from the onslaught and in fact does not realize any financial benefit from the effects. How is this attack most likely orchestrated? Who is most likely to engage in this act—that is, whose habits and limitations are clearly suited to such conduct—and why? Solution Most probably the website is slowed by a DDOS (Distributed Denial of Service) attack. In this attack the hacker sends multiple fake requests from different servers with the intention of slowing down the service to legitimate users. The most likely suspect is an anonymous hacking group. These groups are formed by professional hackers who come together for a common cause. The most likely reason might to gain attention or the group considers something the company is doing as against their beliefs.