Artwork

Content provided by Brady Murphy. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Brady Murphy or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Cybersecurity: DoS and DDoS attacks

16:31
 
Share
 

Archived series ("HTTP Redirect" status)

Replaced by: Bit of Code

When? This feed was archived on June 30, 2018 04:26 (5+ y ago). Last successful fetch was on June 20, 2018 02:15 (6y ago)

Why? HTTP Redirect status. The feed permanently redirected to another series.

What now? If you were subscribed to this series when it was replaced, you will now be subscribed to the replacement series. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 209578288 series 2328623
Content provided by Brady Murphy. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Brady Murphy or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

What is up, guys! Hope you've had a great past week like me. I've been all over the continent this past week trying to refresh from work and my outside projects so I can come back more sharp and ready for all of you guys following the Bit of Code journey. If you haven't listened to my past episodes, my name is Brady Murphy and I am a student at Virginia Tech studying Computer Science and mathematics. Today, I decided to bring you a slice of the work I'm doing at NASA and that is cybersecurity. Although most people understand that it's vital to have a strong cyber defense these days, not many understand how to actually defend against these attacks, or even have a general knowledge of what is being executed. So, to clear up the smoke screen for you guys, today I'm going to be talking about Denial of service attacks.

SHOW NOTES

----------------

What is a denial of service attack?

"In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet." - Wikipedia

These are conducted when a single attacker sends so many packets to the server that it can barely distinguish between valid and invalid requests. The point of this is to exhaust one of the resources that the server has, which is usually bandwidth and/or computing power. All of these requests will then overwhelm the server to a point where it can't process any more requests and effectively denies the clients of the server from accessing the resources needed.

DDoS attacks are very similar, but instead of it being a one-man army, the hacker employs thousands of bots to work for him/her. This is done by creating some form of malware and getting humans to install it themselves by clicking on various links and emails.

Once a user installs this malware, they're officially a bot for the hacker to use. The accumulation of thousands of bots is called a botnet. The botnet is then used to execute the distributed denial of service attack on their victim of choice.

How can we defend?

1) Since the hacker establishes bots by capitalizing on the human error. Make sure to instill within the company that noone should by any means click on a link that they do not know the destination too. Yes, that Nigerian Prince is FAKE and NO you won't be getting his money... he'll be snatching yours!

2) Higher a blue team to validate vulnerabilities and define ways to fix them/ higher a professional cybersecurity company to install software to monitor traffic and filter out invalid requests.

3) Have a bandwidth subscription that is way over the normal usage to allow for fluff room in case a DoS attack is executed against you.

4) Set up a stronger firewall!

  continue reading

7 episodes

Artwork
iconShare
 

Archived series ("HTTP Redirect" status)

Replaced by: Bit of Code

When? This feed was archived on June 30, 2018 04:26 (5+ y ago). Last successful fetch was on June 20, 2018 02:15 (6y ago)

Why? HTTP Redirect status. The feed permanently redirected to another series.

What now? If you were subscribed to this series when it was replaced, you will now be subscribed to the replacement series. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 209578288 series 2328623
Content provided by Brady Murphy. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Brady Murphy or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

What is up, guys! Hope you've had a great past week like me. I've been all over the continent this past week trying to refresh from work and my outside projects so I can come back more sharp and ready for all of you guys following the Bit of Code journey. If you haven't listened to my past episodes, my name is Brady Murphy and I am a student at Virginia Tech studying Computer Science and mathematics. Today, I decided to bring you a slice of the work I'm doing at NASA and that is cybersecurity. Although most people understand that it's vital to have a strong cyber defense these days, not many understand how to actually defend against these attacks, or even have a general knowledge of what is being executed. So, to clear up the smoke screen for you guys, today I'm going to be talking about Denial of service attacks.

SHOW NOTES

----------------

What is a denial of service attack?

"In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet." - Wikipedia

These are conducted when a single attacker sends so many packets to the server that it can barely distinguish between valid and invalid requests. The point of this is to exhaust one of the resources that the server has, which is usually bandwidth and/or computing power. All of these requests will then overwhelm the server to a point where it can't process any more requests and effectively denies the clients of the server from accessing the resources needed.

DDoS attacks are very similar, but instead of it being a one-man army, the hacker employs thousands of bots to work for him/her. This is done by creating some form of malware and getting humans to install it themselves by clicking on various links and emails.

Once a user installs this malware, they're officially a bot for the hacker to use. The accumulation of thousands of bots is called a botnet. The botnet is then used to execute the distributed denial of service attack on their victim of choice.

How can we defend?

1) Since the hacker establishes bots by capitalizing on the human error. Make sure to instill within the company that noone should by any means click on a link that they do not know the destination too. Yes, that Nigerian Prince is FAKE and NO you won't be getting his money... he'll be snatching yours!

2) Higher a blue team to validate vulnerabilities and define ways to fix them/ higher a professional cybersecurity company to install software to monitor traffic and filter out invalid requests.

3) Have a bandwidth subscription that is way over the normal usage to allow for fluff room in case a DoS attack is executed against you.

4) Set up a stronger firewall!

  continue reading

7 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide