Writing Assignment: Module 08 Real-World Flashcards

1
Q

Learn more about denial-of-service attacks by visiting youtube.com. Enter the search term “DoS versus DDoS attacks.” Choose at least two of the options and view the videos. (Note that you may be required to view advertisements unless you have a YouTube service account.) As you watch, look for the reasons why DDoS attacks are usually more impactful.

A

its much harder to deal with a DDoS attack due to the amout of requests, as the scale of a DDoS attack can be in the hundreds or thousands. As DDos attacks are comprised by a large botnot it makes its hard to stop it as they can be quite resilient. Because DDoS attacks are generally larger and more resilient, they can have a much greater impact on the target system. In some cases, a DDoS attack can completely overwhelm the system, causing it to crash or worse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Depending on where you live and copyright requirements, the documentary “The KGB, the Computer and Me” may be available for viewing on public video-streaming services. Use a search engine to find the title and watch the documentary if it is available. (The video remains available as of 2020; its run time is about 57 minutes.) As you watch the film, note what makes Cliff start the search for the hacker.

A

he was motivated by his curiosity, a desire to protect the lab’s computer system, and his sense of duty to prevent unauthorized access to sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

One example of unauthorized access occurs when a relatively low-level account is used to gain access and then the commandeered account has its privileges escalated. To learn more about this, visit youtube.com. Enter the search term “privilege escalation demonstration.” Choose at least two of the options and view the videos. (Note that you may be required to view advertisements unless you have a YouTube service account.) As you watch, look for the techniques used to achieve the desired result.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One example of unauthorized access occurs when a relatively low-level account is used to gain access and then the commandeered account has its privileges escalated. To learn more about this, visit youtube.com. Enter the search term “privilege escalation demonstration.” Choose at least two of the options and view the videos. (Note that you may be required to view advertisements unless you have a YouTube service account.) As you watch, look for the techniques used to achieve the desired result.

A

some techniques used to privilege escalation is exploiting vulnerabilities in the system, password cracking, and or misconfigured access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly