Write 4 to 5 paragraphs about the Dyn cyber attack that occurred in 2016. 1-What techniques were used to launch the attack? 2- Who was the victim? 3-What was the vulnerability in the victim that led to the success of this attack? 4-What are some of the remedial measures, if any, that have been taken after the attack? Solution Dyn Cyber Attack occurred on October 21, 2016. It was a series of distributed denial-of-service (DDoS) attacks against Dyn DNS impacted the availability of a number of sites concentrated in the Northeast US and, later, other areas of the country using maliciously targeted, masked TCP and UDP traffic over port 53.The attacks struck Twitter, Paypal, Spotify and other customers of an infrastructure company in New Hampshire called Dyn, which acts as a switchboard for internet traffic. \"Internet Of Things (IOT)\" techniques were used to launch the attack. One of the sources of the attack is coming from devices known as the \"Internet of Things\" devices such as DVRs, Printers, and appliances connected to the internet. One portion of the attack was initiated by a Mirai Command and Control server. Mirai botnets were previously used in the DDoS attacks earlier against the “Krebs on Security” blog and the French internet service and hosting provider OVH. Mirai is one of two malware families that are being used to get armies of zombies together and perform attacks on targets. The botnet behind the Krebs attack used a particular malware code, known as Mirai, which scans the internet looking for vulnerable IoT devices that have default settings. As in, you haven\'t changed your username and password from admin. Attackers wrote a small piece of code, deployed it and now all these internets of things devices, which most people just set up and forget about, are actively participating in a DDoS attack. Criminals have used these attacks as a means of extortion. These attack techniques are broadly available. Fully capable DDoS attack tools are available for free download. Criminal groups offer DDoS services for hire. These vulnerabilities in the victim that led to the success of this attack. After the attack, observations of the TCP attack volume from a few of our data centers indicate packet flow bursts 40 to 50 times higher than normal. This magnitude does not take into account a significant portion of traffic that never reached Dyn due to our own mitigation efforts as well as the mitigation of upstream providers..