Share
Explore BrainMass

Cyber-terrorism

Explain how a denial of service attack works. How and why are these attacks effective in their goals? Who would be the primary targets for these types of attacks?

Solution Preview

Dear Student,
Hi and thank you for using Brainmass. The solution below should get you started. Alternatively, you can also use the listed references to further explore the topic. Before anything else, I would like to suggest an Outline that can be used to tackle these questions:

1. Defining DOS attacks - what is a DOS attack and why is it dangerous? 150 words.
2. Cyberterrorism and DOS attacks - how can a DOS attack serve terrorist agenda, how are they effective?150 words.
3. Sample of targets - around 100 words.

The narrative below follows this outline. Good luck with your studies.

Sincerely,
OTA 105878/Xenia Jones
---------------------------------------------------------------

The DOS Attack & Cyberterrorism

What is a DOS attack? The US Computer Emergency Readiness Team (CERT), the agency under the Department of Homeland Security responsible for the threat of Cyberterrorism explains DOS attacks as such (2012):

"In a denial-of-service (DOS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you ...

Solution Summary

The solution provides information, assistance and advise on the topic of cyber-terrorism, in particular the denial-of-service (DOS) attacks. providing insight to the questions listed above.

$2.19