A web-based registration and cashiering system

Assignment Help Basic Computer Science
Reference no: EM13268284

You work for a large public university that utilizes a web-based registration and cashiering system that allows students to register for, pay for, and drop classes. Naturally, peak usage times are during registration season shortly before the start of a new quarter. The system has been in place for about a year and a half and has greatly reduced the workforce needed to staff the registration office during registration season; as a result of implementing the new system, over three-quarters of the registration staff were reassigned to other parts of the university.

However, during registration for the most recent quarter, the web-based system suffered a crippling distributed denial-of-service (DDoS) attack that made the system unavailable for about 24 hours. The university's network staff was certain that the attack did not initiate from an external network source since the university has a series of mechanisms in place to intercept such attacks. Further investigation revealed that the attack originated from the internal network. The network team discovered that a password sniffer application was somehow installed on a large portion of the computers in various university computer labs. The password sniffer captured one of the administrative passwords that was recently used to remotely install a critical operating system patch for these computers. Once compromised, the computers were then used collectively to perform a DDoS attack that flooded the registration system's web servers with thousands of bogus HTTP requests, which quickly overwhelmed the servers and caused them to become unavailable.

As the lead network specialist, you have been asked to recommend countermeasures to protect the university's registration system against this type of denial-of-service (DoS) attack.
Task:
A. Create a diagram to illustrate how the attack occurred. In your diagram, include the following:

  • The web server

 

  • Computer labs

 

  • Network equipment

 

  • How the traffic is flowing to the registration system

B. Recommend in an executive summary (suggested length of 2 pages) preventive measures to counter this type of DoS attack.
Note: The executive summary will be read primarily by nontechnical management staff, so it is important that the summary sufficiently develops and addresses the topic but does not overwhelm the reader with unexplained technical terminology.
C. When you use sources, include all in-text citations and references in APA form

 

Reference no: EM13268284

Questions Cloud

Learning objectives using blooms taxonomy : Construct three learning objectives containing appropriate active verbs. Identify a possible teaching strategy for each of your objectives.
Explain halogen compounds to five or more significant : Calculate the formula for each of the following halogen compounds to five or more significant figures
Explain how much dry solute would you take to prepare : How much dry solute would you take to prepare each of the following solutions from the dry solute and the solvent
Design cmos differential pair amplifier with low freq gain : Design a CMOS Differential pair amplifier with a low frequency gain of at least 30dB, while driving a resistive load 50-ohm. The available circuit components are NMOS transistor, PMOS transistor, resistors, capacitors and inductors.
A web-based registration and cashiering system : You work for a large public university that utilizes a web-based registration and cashiering system that allows students to register for, pay for, and drop classes
Calculate the magnetic braking force : Consider a bar (L=3.00m) is sliding to the right on 2 rails with a velocity (0.75 m/s) towards a resistor (20 ohms), calculate the "Magnetic Braking force"
What will the price of this bond be : A $1,000 bond has a coupon rate of 10 percent and matures after 8 years. Interest rates are currently 7%.
Explain nitric acid is usually purchased in a concentrated : Nitric acid is usually purchased in a concentrated form that is 70.3% HNO3 by mass and has a density of 1.41 g/mL. How much concentrated solution would you take to prepare
How many input lines are needed for a 128- to-1 multiplexer : a) The input of Hex- to - seven segment decoder is 1010. what will the display show b) A priority encoder has all inputs activated. Which input will be encoded. Why c) how many select input lines are needed for a 128- to - 1 multiplexer

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write specifications a method that advances any given date

A date consists of a month, day, and year. Frequently, we represent each of these items as integers. For example, July 4, 1990, is a month 7, day 4, and year 1990.

  Create an new windows form application

Create an new windows form application. Add 2 controls that can display multi-line text. Use the application to enter data into an ArrayList (or you can initialize the arrayList via the application).

  Identify three operational applications for airlines company

For an airlines company, identify three operational applications that would feed into the data warehouse. What would be the data load and refresh cycles for each

  Compute mean number of rounds per contention period

Determine the probability that the contention ends on round k, and compute the mean number of rounds per contention period?

  Loss of generality in private-key encryption

Prove that, in the context of private-key encryption, we can assume without loss of generality that keys are chosen uniformly at random (and so Gen is trivial).

  Design of e-business applications

With that in mind, how do you think the Americans with Disabilities Act affects website design and design of E-business applications?

  Write a conditional that assigns the boolean value true

Write a conditional that assigns the boolean value true to the variable fever if the variable temperature is greater than 98.6 .So if temperature has the value 99.5,

  The commonly used password management protocol

Analyze one of the commonly used password management protocol  what is the weakness of this protocol?

  Find whether bit string contains two consecutive one bits

You wish to find out whether bit string contains two consecutive 1 bits. Obviously, you can do this using n probes. For which values of n in range {3, 4, 5, 6, 7} can this be done using fewer than n probes?

  Explain potential challenge of collaboration of firms

Author suggests ways to do this. Explain the potential challenge that this kind of collaboration might face and explain the way of dealing with it.

  Assume the friction coefficient between the rope and capstan

How many wraps around the capstan are required such that one person exerting 100lbs of force can keep the ship at its mooring. Assume the friction coefficient between the rope and capstan is 0.2.

  What is the current size of q

Suppose an initially-empty queue Q has performed a total of 32 enqueue operations, 10 front operations, and 15 dequeue operations, 5 of which generated QueueEmptyExceptions,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd