DDoS Attacks and Cyber Security

CompatibleVanadium avatar
CompatibleVanadium
·
·
Download

Start Quiz

Study Flashcards

24 Questions

What is the primary purpose of implementing hashing and digital signatures in ensuring data integrity?

To detect any unauthorized modifications to data

What is the purpose of providing a computed checksum and the hash function used to compute it?

To validate the accuracy and completeness of the data

What is an essential component of a Service Level Agreement (SLA) in ensuring availability requirements?

Maximum Tolerable Downtime (MTD)

What is the topic that Professor Raymond Chan will discuss in the second half of the module?

Static Code Analysis

Why is it important to have a security checklist?

To ensure system integrity and reliability

What is the primary goal of availability requirements?

To protect against unwanted destruction or disruption of services

What is the purpose of measuring Maximum Tolerable Downtime (MTD) in a Service Level Agreement (SLA)?

To set a threshold for acceptable system downtime

What is the primary benefit of using checksum validation?

To ensure data authenticity and integrity

What should a Security Checklist contain?

Specifications required for implementation, such as protocols to use and encryption strength

What is the main objective of implementing a Random Number Generator in a security protocol?

To ensure confidentiality of data

What type of attack involves determining sensitive information through indirect means?

Side-channel attack

What Act should be considered when dealing with personal data storage?

Personal Data Protection Act

What is an example of a data requirement?

Personal data storage

What is a consequence of failing to categorize suspicious activity as a cyberattack?

Inaction against cyberattacks

What is the name of the checklist provided by SANS for securing web application technologies?

SANS Securing Web Application Technologies Checklist

What can be leaked through direct or indirect means?

Information

What is the primary goal of a Distributed Denial of Service (DDoS) attack?

To compromise the availability of a system

Which of the following is NOT a method to mitigate DDoS attacks?

Checksum validation

What is an example of an availability requirement?

The software shall ensure high availability of five nines (99.999%)

What is the purpose of a Content Distribution Network (CDN) in DDoS attack mitigation?

To distribute traffic across multiple servers

Which of the following is an example of a mission critical functionality?

Processing payments

What is the primary goal of DNS load balancing in DDoS attack mitigation?

To distribute traffic across multiple servers

What is the purpose of hiding IP addresses in DDoS attack mitigation?

To prevent IP address discovery

What is the purpose of replicating software and data across data centers?

To provide redundancy and load balancing

Study Notes

DDoS Attacks and Mitigation

  • DDoS attacks aim to compromise system availability by flooding systems with useless work, cutting off network access, or triggering infinite loops
  • Examples of DDoS attacks include Microsoft Service Outage on 21/07/2022

Mitigating DDoS Attacks

  • DNS load balancing
  • Server load balancing
  • Content Distribution Network
  • Firewall:
    • Layer 3: Network Firewall
    • Layer 5 (7): App Firewall
  • HIDE ALL IP ADDRESSES

Availability Requirements

  • Ensure high availability of five nines (99.999%)
  • Specify the number of simultaneous users (e.g., 300 users)
  • Implement load balancing and redundancy across data centers
  • Define recovery time objectives (RTO) for:
    • Mission critical functionality (1 hour)
    • Mission essential functionality (4 hours)
    • Mission support functionality (24 hours)

Data Requirements

  • Identify the types of data to be stored (e.g., personal data, finance, communication, credit card information)
  • Consider Personal Data Protection Act requirements

Data Leakage

  • Information can be leaked directly or indirectly (side channels)
  • Examples: SingHealth data leakage cases

Integrity Requirements

  • Prevent unauthorized modifications to ensure system and data integrity
  • Implement security controls like hashing and digital signatures
  • Capture specifications like protocols, data randomness strength (e.g., salt length) in security checklists
  • Ensure reliability and accuracy of information

Integrity and Security Checklists

  • OWASP Security Code Checklist
  • Static code analysis

Security Best Practices

  • Be cautious when downloading software from official websites
  • Verify software integrity using checksums and hash functions

This quiz covers Distributed Denial of Service attacks, their impact on system availability, and tactics used to compromise systems. Learn how DDoS attacks work and how to protect against them.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser