Castelli 72030 LOT2 Task 2.pdf - Matthew J. Castelli...

This preview shows page 1 - 2 out of 4 pages.

Matthew J. Castelli [email protected] Student ID: 72030 LOT2 – Task 2 Best Practices Guide This security best practices guide is based on industry approaches to DoS/DDoS attacks like the one experienced by the university. There is no “one size fits all” approach however there are common elements amongst many sources which are distilled here in three categories for university use and consideration: Defense, Detection, and Response. Defense Complacency and Self-AssessmentIT administrator complacency can wreak havoc on the university’s network because while an attack might not have occurred prior to this incident, as was demonstrated, rarity does not mean impossible. It is likely during the existence of the university’s network, the IT administrator and staff might have grown comfortable with the network’s high availability and security (Cretzman & Weeks, 2014). However understandable this thinking might be, it is no longer tenable and a shift in thinking from “it won’t happen to us” to “it can happen to us at any time” is necessary by the university IT staff and management personnel. The best approach preventing this complacency is to look for the strongest components of the university’s network and imagine attack and failure scenarios (Cretzman & Weeks, 2014); in other words the university can best identify issues by attacking its own network – a self-assessment or Black Hat checkup (IT Business Edge, 2014). In using a Black Hat checkup, the university can use an individual or a group not having knowledge of the university’s network environment to attempt penetration or conduct other attacks, such as a DoS/DDoS attack. This checkup can be accomplished by hiring an outside organization or leveraging university computer science students (who would not normally have the same level of network visibility as the university’s IT staff). Several benefits exist here in using students, such as: realized cost savings in not hiring outside specialists, each year new students would likely bring new knowledge and creative attacks which can provide an up-to-date

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 4 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
NoProfessor
Tags

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture