Lab 4 ) Network Vulnerabilities Part 2

For your journal entry answer the following questions

  1. Explain in your own words the DOS attack scenario.

A Dos attack is when one computer floods a server with a large number of request packets. With all the attacker’s fake requests using up all the available memory other packets need to wait till their is enough memory for them to use

  1. Explain in your own words how the Hping3 attack causes the denial of service.

Hping3 allows a user to manipulate not only the size of the packets being send but also the quantity of each packets over a given network.

  1. Discuss the benefits of using anti-phishing functionality.

By installing such extensions in one’s browser a user can be alerted by the program if the website the wish to connect to is a known website for phishing. This will give the user the option of either not getting navigated to the website or continuing anyways.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Design a site like this with WordPress.com
Get started