SlideShare a Scribd company logo
1 of 16
Security Risks
Denial Of Service Attacks and effects
A Denial of Service (DOS) attack is an active attack, where an attempt is made to force
a website/online service to not be able to provide its service.
How will you know you are being DOS’ed?
❏ Your server/system may have slow/sluggish performance
❏ users may have an inability to access it
Reason’s behind a DOS attack?
Financial
Blackmail
Hacker for hire
Political
You don’t agree with the other sides views
Personal
Grudge against a former employer etc
Motivation behind a DOS attack?
Personal
Disgruntled employee
Relationship breakup
What about anti competitive practices?
Can be be financially motivated or personal?
What about just to see if it can be done?
Costs associated with a DOS attack
There will be costs associated with a DOS attack
Some costs would be
1. Lost revenue through to downtime
2. Determining the nature of the attack
3. The payment for labour to repair and response to the attack
4. Payment for labour to devise and implement safeguards
5. Additional admin to compensate for loss of network services
Types of DOS
There are various methods by which a Denial Of Service attack can be implemented
1. Physical/Hardware
2. Bandwidth Consumption
3. Resource Starvation
4. Hardware attacks
5. Routing/DNS Attacks
Physical Attacks
The easiest physical attack is to actually cut the wires/break the service of a server
This can be through attacking switches/routers or other infrastructure
Bandwidth Consumption
An attacker may be able to flood your server with packets of information
These can be as simple as PING (ICMP echo) requests
This forces the server to respond that it has received the packet
This consumes the bandwidth available to the server
Resource Starvation
A server has a finite amount of physical resources such as
Backing Storage
Memory
An attack of this type will try to exhaust these resources
What if you are able to continually force a server to create new user accounts or new
orders
Or spamming an email server so that it uses all of the available backing
storage?
Not all DOS are malicious
A “test email” sent to more than 1.2 million NHS employees caused the entire system to
crash on Monday morning (14/11/16)
NHS staff used Twitter to complain about an email that “inadvertently” included
everyone on the mailing list of the NHSmail system. As thousands of replies to all were
sent in response, asking to be removed from the mailing list, many claimed the entire
system crashed.
Staff used social media to encourage others to stop replying to the message.
DNS Attacks
When you enter a URL into a browser. This URL is sent to a DNS server (Domain Name
Service)
The DNS server resolves the URL into an IP address
212.58.246.94
DNS attacks (cont.)
One type of DNS attack would be to cause the DNS servers to route traffic to a target
server consuming bandwidth
Another would be to route traffic to a server of the attackers choosing
So the users are denied the access of the server they wanted to
Example DOS Attack
Attacker
Victim
Distributed Denial Of Service (DDOS)
A Distributed Denial of Service (DDOS) attack is a type of DOS that uses a network of
computers sometimes called a botnet or zombie army.
The users of the zombies may be unaware
Can be achieved through viruses/trojans
Example DDOS
Passive Attacks
Passive attacks are where an attacker may just monitor a network
Perhaps just intercepting data
Can be very difficult to identify this is occurring
Encryption would be the primary defence against this

More Related Content

Similar to Security risks

3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf
PrasannaKumarpanda2
 

Similar to Security risks (20)

A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONSA SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
 
50120140502001 2
50120140502001 250120140502001 2
50120140502001 2
 
Major Web Sever Threat.pptx
Major Web Sever Threat.pptxMajor Web Sever Threat.pptx
Major Web Sever Threat.pptx
 
Using the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdfUsing the Web or another research tool, search for alternative means.pdf
Using the Web or another research tool, search for alternative means.pdf
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf3-JournalofCommunicationsVol.14No.2February2019.pdf
3-JournalofCommunicationsVol.14No.2February2019.pdf
 
546 220-228
546 220-228546 220-228
546 220-228
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
 
DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)DNS spoofing/poisoning Attack Report (Word Document)
DNS spoofing/poisoning Attack Report (Word Document)
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
Ddos attacks
Ddos attacksDdos attacks
Ddos attacks
 
A vivacious approach to detect and prevent d do s attack
A vivacious approach to detect and prevent d do s attackA vivacious approach to detect and prevent d do s attack
A vivacious approach to detect and prevent d do s attack
 
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree AlgorithmIRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
 
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS IN CLOUD ENVIRONMENTS
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYA REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
 

More from missstevenson01

Lesson 2 - Coding with Minecraft - Events.pptx
Lesson 2 - Coding with Minecraft - Events.pptxLesson 2 - Coding with Minecraft - Events.pptx
Lesson 2 - Coding with Minecraft - Events.pptx
missstevenson01
 
Lesson 1 - Coding with Minecraft -Introduction.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptxLesson 1 - Coding with Minecraft -Introduction.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptx
missstevenson01
 

More from missstevenson01 (20)

S3 environment
S3 environmentS3 environment
S3 environment
 
The Processor.pptx
The Processor.pptxThe Processor.pptx
The Processor.pptx
 
How Computers Work
How Computers WorkHow Computers Work
How Computers Work
 
Lesson 3 - Coding with Minecraft - Variables.pptx
Lesson 3 -  Coding with Minecraft -  Variables.pptxLesson 3 -  Coding with Minecraft -  Variables.pptx
Lesson 3 - Coding with Minecraft - Variables.pptx
 
Lesson 2 - Coding with Minecraft - Events.pptx
Lesson 2 - Coding with Minecraft - Events.pptxLesson 2 - Coding with Minecraft - Events.pptx
Lesson 2 - Coding with Minecraft - Events.pptx
 
Lesson 1 - Coding with Minecraft -Introduction.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptxLesson 1 - Coding with Minecraft -Introduction.pptx
Lesson 1 - Coding with Minecraft -Introduction.pptx
 
Lesson2 - Coding with Minecraft - Events.pptx
Lesson2 - Coding with Minecraft - Events.pptxLesson2 - Coding with Minecraft - Events.pptx
Lesson2 - Coding with Minecraft - Events.pptx
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
S1 internet safety-chattingonline
S1 internet safety-chattingonlineS1 internet safety-chattingonline
S1 internet safety-chattingonline
 
S3 wireframe diagrams
S3 wireframe diagramsS3 wireframe diagrams
S3 wireframe diagrams
 
Sql
SqlSql
Sql
 
Alien database
Alien databaseAlien database
Alien database
 
Video Games and Copyright laws
Video Games and Copyright lawsVideo Games and Copyright laws
Video Games and Copyright laws
 
Games Design Document
Games Design DocumentGames Design Document
Games Design Document
 
Video game proposal
Video game proposalVideo game proposal
Video game proposal
 
Evaluation
EvaluationEvaluation
Evaluation
 
H evaluation
H evaluationH evaluation
H evaluation
 
H testing and debugging
H testing and debuggingH testing and debugging
H testing and debugging
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 

Security risks

  • 2. Denial Of Service Attacks and effects A Denial of Service (DOS) attack is an active attack, where an attempt is made to force a website/online service to not be able to provide its service. How will you know you are being DOS’ed? ❏ Your server/system may have slow/sluggish performance ❏ users may have an inability to access it
  • 3. Reason’s behind a DOS attack? Financial Blackmail Hacker for hire Political You don’t agree with the other sides views Personal Grudge against a former employer etc
  • 4. Motivation behind a DOS attack? Personal Disgruntled employee Relationship breakup What about anti competitive practices? Can be be financially motivated or personal? What about just to see if it can be done?
  • 5. Costs associated with a DOS attack There will be costs associated with a DOS attack Some costs would be 1. Lost revenue through to downtime 2. Determining the nature of the attack 3. The payment for labour to repair and response to the attack 4. Payment for labour to devise and implement safeguards 5. Additional admin to compensate for loss of network services
  • 6. Types of DOS There are various methods by which a Denial Of Service attack can be implemented 1. Physical/Hardware 2. Bandwidth Consumption 3. Resource Starvation 4. Hardware attacks 5. Routing/DNS Attacks
  • 7. Physical Attacks The easiest physical attack is to actually cut the wires/break the service of a server This can be through attacking switches/routers or other infrastructure
  • 8. Bandwidth Consumption An attacker may be able to flood your server with packets of information These can be as simple as PING (ICMP echo) requests This forces the server to respond that it has received the packet This consumes the bandwidth available to the server
  • 9. Resource Starvation A server has a finite amount of physical resources such as Backing Storage Memory An attack of this type will try to exhaust these resources What if you are able to continually force a server to create new user accounts or new orders Or spamming an email server so that it uses all of the available backing storage?
  • 10. Not all DOS are malicious A “test email” sent to more than 1.2 million NHS employees caused the entire system to crash on Monday morning (14/11/16) NHS staff used Twitter to complain about an email that “inadvertently” included everyone on the mailing list of the NHSmail system. As thousands of replies to all were sent in response, asking to be removed from the mailing list, many claimed the entire system crashed. Staff used social media to encourage others to stop replying to the message.
  • 11. DNS Attacks When you enter a URL into a browser. This URL is sent to a DNS server (Domain Name Service) The DNS server resolves the URL into an IP address 212.58.246.94
  • 12. DNS attacks (cont.) One type of DNS attack would be to cause the DNS servers to route traffic to a target server consuming bandwidth Another would be to route traffic to a server of the attackers choosing So the users are denied the access of the server they wanted to
  • 14. Distributed Denial Of Service (DDOS) A Distributed Denial of Service (DDOS) attack is a type of DOS that uses a network of computers sometimes called a botnet or zombie army. The users of the zombies may be unaware Can be achieved through viruses/trojans
  • 16. Passive Attacks Passive attacks are where an attacker may just monitor a network Perhaps just intercepting data Can be very difficult to identify this is occurring Encryption would be the primary defence against this