Hacks & Attacks Continue

OPENING QUESTIONS: 

OBJECTIVES: 

I will work with my team to get a better idea of how a ddos attack is implemented.

I will work with my team to determine how ddos attacks are handled by modern networks.

WORDS FOR TODAY:

  • Big Data - a broad term for datasets so large or complex that traditional data processing applications are inadequate.
  • Moore's Law - a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since.
  • Field - A holder of unique data of a unique data type (For example an AGE field contains integer data that stores a person's age. A field named FNAME would store character data that stores a person's first name
  • Record - A "Row" of data related to a specific topic. For example FNAME, LNAME, ADDRESS, CITY, STATE, ZIP would contain data relating to a specific person.
  • Table - A "Table" of data contains a bunch of rows of data. For example a spreadsheet is a table of data.
  • Data Types:int | long | boolean | date | text
  • botNets: Nefarious users sometimes infect dozens, hundreds or even thousands of computers with malware that opens a certain port and..... listens for directions. The majority of the time that malware doesn't 'hear' anything. But very occasionally it receives instructions from the Nefarious actor instructing it (the infected computer) to execute some sort of 'attack'
  • Rouge Access Point: These used to be fairly common but with widespread encryption and strong passwords they are much less so nowawadays. Nonetheless, the AP wants you to be aware of those: Imagine you are sitting in your favorite coffee shop and the network is down. You can your wifi network options and you find one that is open, available and says "FreeNet". You click on that wifi and your laptop is connected to that network. The bad news is whatever is flying across that wifi router is intercepted. uh oh!

WORK O' THE DAY

Data (if you can't find an appropriate set) is HERE

By the way-- what are the types of hacks/attacks that the AP wants you to be aware of? <go!>

═══════════════════════════

Imagine you were the network admin and your server was suddenly getting overwhelmed with 'ping' type requests. What do you do?

I've been saying that Ddos attacks are typically simple 'ping' type requests (although lots and lots of them!) hitting a server every second. Please do a wee bit of research and determine how accurate that statement is (save your sources!)

Now let's do a wee bit more research and check and see how modern networks handle such attacks. Once again check your sources.

Spot check: Compare a worm virus to a trojan virus

Spot check: Contrast a worm virus to a trojan virus

═══════════════════════════

Please describe a Rogue Access Point and why we are at the 'mercy' of a well setup router every time we access WiFi at our favorite coffee joints.

Oh and isn't THIS dandy

Here's what the news said

Back to our hack/attack projects -- what am I emphasizing the most in my grading? (please discuss)