SlideShare a Scribd company logo
1 of 2
Read the Opening Case Scenario called Viral Vandal.
Describe the detection and analysis steps in this case. What
would you do contain and eradicate this threat?
Case:
1. Why is it critical for an organization to have a DoS attack
response plan well before it happens?
2. Use the four steps of the NIST computer security process to
write a summary and analysis of each of the steps in a DDoS
attack scenario.
a. Step 1 - Preparation: What steps would you take to prepare
for this type of incident?
b. Step 2 - Detection and Analysis: Steps you would need to
take in order to detect a potential DDoS incident and confirm if
the incident is accurate
c. Step 3 - Containment Eradication and Recovery: What
actions do you need to take to contain and recover from a DDoS
incident
d. Step 4 - Post-Incident Activity - Describe the steps you
would take post incident
Required:
200-to-300 words
Read the Opening Case Scenario called Viral Vandal. Describe the

More Related Content

More from gabriellabre8fr

One page paper. The topics are Tributary Systems, Slavery and the .docx
One page paper. The topics are Tributary Systems, Slavery and the .docxOne page paper. The topics are Tributary Systems, Slavery and the .docx
One page paper. The topics are Tributary Systems, Slavery and the .docxgabriellabre8fr
 
one or two paper due Sunday here is the instructionCozy Val.docx
one or two paper due Sunday here is the instructionCozy Val.docxone or two paper due Sunday here is the instructionCozy Val.docx
one or two paper due Sunday here is the instructionCozy Val.docxgabriellabre8fr
 
one page lab report on Co2 emmisions on my environmental science. T.docx
one page lab report on Co2 emmisions on my environmental science. T.docxone page lab report on Co2 emmisions on my environmental science. T.docx
one page lab report on Co2 emmisions on my environmental science. T.docxgabriellabre8fr
 
One of the things we do in IT is use technology to match people up. .docx
One of the things we do in IT is use technology to match people up. .docxOne of the things we do in IT is use technology to match people up. .docx
One of the things we do in IT is use technology to match people up. .docxgabriellabre8fr
 
One of the most contentious issues that divide conservatives and lib.docx
One of the most contentious issues that divide conservatives and lib.docxOne of the most contentious issues that divide conservatives and lib.docx
One of the most contentious issues that divide conservatives and lib.docxgabriellabre8fr
 
One of the most common questions the general public asks about intim.docx
One of the most common questions the general public asks about intim.docxOne of the most common questions the general public asks about intim.docx
One of the most common questions the general public asks about intim.docxgabriellabre8fr
 
Once an individual has become a victim of a crime, there is the myst.docx
Once an individual has become a victim of a crime, there is the myst.docxOnce an individual has become a victim of a crime, there is the myst.docx
Once an individual has become a victim of a crime, there is the myst.docxgabriellabre8fr
 
On which issue are the stage theories of Erikson and Piaget in agr.docx
On which issue are the stage theories of Erikson and Piaget in agr.docxOn which issue are the stage theories of Erikson and Piaget in agr.docx
On which issue are the stage theories of Erikson and Piaget in agr.docxgabriellabre8fr
 
On October 1, 2015, Santana Rey launched a computer services company.docx
On October 1, 2015, Santana Rey launched a computer services company.docxOn October 1, 2015, Santana Rey launched a computer services company.docx
On October 1, 2015, Santana Rey launched a computer services company.docxgabriellabre8fr
 
On Monday, February 29, 2016 301 PM, [email protected] [.docx
On Monday, February 29, 2016 301 PM, [email protected] [.docxOn Monday, February 29, 2016 301 PM, [email protected] [.docx
On Monday, February 29, 2016 301 PM, [email protected] [.docxgabriellabre8fr
 
On January 28, 1986, the Space Shuttle Challenger was destroyed upon.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed upon.docxOn January 28, 1986, the Space Shuttle Challenger was destroyed upon.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed upon.docxgabriellabre8fr
 
On January 1, 2014, Lennon Industries had stock outstanding as follo.docx
On January 1, 2014, Lennon Industries had stock outstanding as follo.docxOn January 1, 2014, Lennon Industries had stock outstanding as follo.docx
On January 1, 2014, Lennon Industries had stock outstanding as follo.docxgabriellabre8fr
 
On December 1, 2016, Geneva Jordan opened her new business with the .docx
On December 1, 2016, Geneva Jordan opened her new business with the .docxOn December 1, 2016, Geneva Jordan opened her new business with the .docx
On December 1, 2016, Geneva Jordan opened her new business with the .docxgabriellabre8fr
 
On Defense Witnesses Describe Chinatown Beating”.  Find the descrip.docx
On Defense Witnesses Describe Chinatown Beating”.  Find the descrip.docxOn Defense Witnesses Describe Chinatown Beating”.  Find the descrip.docx
On Defense Witnesses Describe Chinatown Beating”.  Find the descrip.docxgabriellabre8fr
 
Oil - Environment Define at least two alternatives to oil th.docx
Oil - Environment Define at least two alternatives to oil th.docxOil - Environment Define at least two alternatives to oil th.docx
Oil - Environment Define at least two alternatives to oil th.docxgabriellabre8fr
 
omplete the following CJi Interactive activities.Ch. 5 The Poli.docx
omplete the following CJi Interactive activities.Ch. 5 The Poli.docxomplete the following CJi Interactive activities.Ch. 5 The Poli.docx
omplete the following CJi Interactive activities.Ch. 5 The Poli.docxgabriellabre8fr
 
ompare the various motivations for establishing the colonies. How we.docx
ompare the various motivations for establishing the colonies. How we.docxompare the various motivations for establishing the colonies. How we.docx
ompare the various motivations for establishing the colonies. How we.docxgabriellabre8fr
 
Okay here are the two attachments one is the 10 articles the other.docx
Okay here are the two attachments one is the 10 articles the other.docxOkay here are the two attachments one is the 10 articles the other.docx
Okay here are the two attachments one is the 10 articles the other.docxgabriellabre8fr
 
ommunity Efforts and Managing Public Relations (PR)  Please respond.docx
ommunity Efforts and Managing Public Relations (PR)  Please respond.docxommunity Efforts and Managing Public Relations (PR)  Please respond.docx
ommunity Efforts and Managing Public Relations (PR)  Please respond.docxgabriellabre8fr
 
ompetencies and KnowledgeFor this assignment, discuss the followin.docx
ompetencies and KnowledgeFor this assignment, discuss the followin.docxompetencies and KnowledgeFor this assignment, discuss the followin.docx
ompetencies and KnowledgeFor this assignment, discuss the followin.docxgabriellabre8fr
 

More from gabriellabre8fr (20)

One page paper. The topics are Tributary Systems, Slavery and the .docx
One page paper. The topics are Tributary Systems, Slavery and the .docxOne page paper. The topics are Tributary Systems, Slavery and the .docx
One page paper. The topics are Tributary Systems, Slavery and the .docx
 
one or two paper due Sunday here is the instructionCozy Val.docx
one or two paper due Sunday here is the instructionCozy Val.docxone or two paper due Sunday here is the instructionCozy Val.docx
one or two paper due Sunday here is the instructionCozy Val.docx
 
one page lab report on Co2 emmisions on my environmental science. T.docx
one page lab report on Co2 emmisions on my environmental science. T.docxone page lab report on Co2 emmisions on my environmental science. T.docx
one page lab report on Co2 emmisions on my environmental science. T.docx
 
One of the things we do in IT is use technology to match people up. .docx
One of the things we do in IT is use technology to match people up. .docxOne of the things we do in IT is use technology to match people up. .docx
One of the things we do in IT is use technology to match people up. .docx
 
One of the most contentious issues that divide conservatives and lib.docx
One of the most contentious issues that divide conservatives and lib.docxOne of the most contentious issues that divide conservatives and lib.docx
One of the most contentious issues that divide conservatives and lib.docx
 
One of the most common questions the general public asks about intim.docx
One of the most common questions the general public asks about intim.docxOne of the most common questions the general public asks about intim.docx
One of the most common questions the general public asks about intim.docx
 
Once an individual has become a victim of a crime, there is the myst.docx
Once an individual has become a victim of a crime, there is the myst.docxOnce an individual has become a victim of a crime, there is the myst.docx
Once an individual has become a victim of a crime, there is the myst.docx
 
On which issue are the stage theories of Erikson and Piaget in agr.docx
On which issue are the stage theories of Erikson and Piaget in agr.docxOn which issue are the stage theories of Erikson and Piaget in agr.docx
On which issue are the stage theories of Erikson and Piaget in agr.docx
 
On October 1, 2015, Santana Rey launched a computer services company.docx
On October 1, 2015, Santana Rey launched a computer services company.docxOn October 1, 2015, Santana Rey launched a computer services company.docx
On October 1, 2015, Santana Rey launched a computer services company.docx
 
On Monday, February 29, 2016 301 PM, [email protected] [.docx
On Monday, February 29, 2016 301 PM, [email protected] [.docxOn Monday, February 29, 2016 301 PM, [email protected] [.docx
On Monday, February 29, 2016 301 PM, [email protected] [.docx
 
On January 28, 1986, the Space Shuttle Challenger was destroyed upon.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed upon.docxOn January 28, 1986, the Space Shuttle Challenger was destroyed upon.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed upon.docx
 
On January 1, 2014, Lennon Industries had stock outstanding as follo.docx
On January 1, 2014, Lennon Industries had stock outstanding as follo.docxOn January 1, 2014, Lennon Industries had stock outstanding as follo.docx
On January 1, 2014, Lennon Industries had stock outstanding as follo.docx
 
On December 1, 2016, Geneva Jordan opened her new business with the .docx
On December 1, 2016, Geneva Jordan opened her new business with the .docxOn December 1, 2016, Geneva Jordan opened her new business with the .docx
On December 1, 2016, Geneva Jordan opened her new business with the .docx
 
On Defense Witnesses Describe Chinatown Beating”.  Find the descrip.docx
On Defense Witnesses Describe Chinatown Beating”.  Find the descrip.docxOn Defense Witnesses Describe Chinatown Beating”.  Find the descrip.docx
On Defense Witnesses Describe Chinatown Beating”.  Find the descrip.docx
 
Oil - Environment Define at least two alternatives to oil th.docx
Oil - Environment Define at least two alternatives to oil th.docxOil - Environment Define at least two alternatives to oil th.docx
Oil - Environment Define at least two alternatives to oil th.docx
 
omplete the following CJi Interactive activities.Ch. 5 The Poli.docx
omplete the following CJi Interactive activities.Ch. 5 The Poli.docxomplete the following CJi Interactive activities.Ch. 5 The Poli.docx
omplete the following CJi Interactive activities.Ch. 5 The Poli.docx
 
ompare the various motivations for establishing the colonies. How we.docx
ompare the various motivations for establishing the colonies. How we.docxompare the various motivations for establishing the colonies. How we.docx
ompare the various motivations for establishing the colonies. How we.docx
 
Okay here are the two attachments one is the 10 articles the other.docx
Okay here are the two attachments one is the 10 articles the other.docxOkay here are the two attachments one is the 10 articles the other.docx
Okay here are the two attachments one is the 10 articles the other.docx
 
ommunity Efforts and Managing Public Relations (PR)  Please respond.docx
ommunity Efforts and Managing Public Relations (PR)  Please respond.docxommunity Efforts and Managing Public Relations (PR)  Please respond.docx
ommunity Efforts and Managing Public Relations (PR)  Please respond.docx
 
ompetencies and KnowledgeFor this assignment, discuss the followin.docx
ompetencies and KnowledgeFor this assignment, discuss the followin.docxompetencies and KnowledgeFor this assignment, discuss the followin.docx
ompetencies and KnowledgeFor this assignment, discuss the followin.docx
 

Read the Opening Case Scenario called Viral Vandal. Describe the

  • 1. Read the Opening Case Scenario called Viral Vandal. Describe the detection and analysis steps in this case. What would you do contain and eradicate this threat? Case: 1. Why is it critical for an organization to have a DoS attack response plan well before it happens? 2. Use the four steps of the NIST computer security process to write a summary and analysis of each of the steps in a DDoS attack scenario. a. Step 1 - Preparation: What steps would you take to prepare for this type of incident? b. Step 2 - Detection and Analysis: Steps you would need to take in order to detect a potential DDoS incident and confirm if the incident is accurate c. Step 3 - Containment Eradication and Recovery: What actions do you need to take to contain and recover from a DDoS incident d. Step 4 - Post-Incident Activity - Describe the steps you would take post incident Required: 200-to-300 words