Professional Documents
Culture Documents
CIA Triad
ATTACK!
Christmas Day 2014
(Turton 2014).
Methods
Combining the LOIC and Netwox attacks produced a much more effective result. The Victim
machine slowed down rapidly, to the point of being completely unresponsive.
Progressed to no processes working mouse movements, opening/closing programs, swapping windows etc.
Limitations
DDoS Simulation
References
Ashford, W. (2016). DDoS is the most common method of cyber attack on financial institutions.Computer Weekly, 4-6.
Botta, A., de Donato, W., Persico, V., & Pescap, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation
Computer Systems,56, 684-700.
Fenrich, K. (2008). Securing your control system: the 'CIA triad' is a widely used benchmark for evaluating information system security
effectiveness.Power Engineering, (2). 44.
Limarunothai, R., & Munlin, M. (2015). Trends and Challenges of Botnet Architectures and Detection Techniques.Journal Of Information
Science & Technology,5(1), 51-57.
Love, D. (2014). Why Microsoft and Sony Couldn't Stop Lizard Squad Attack Despite Warnings. International Business Times
Patil, A., & Gaikwad, R. (2015). Comparative Analysis of the Prevention Techniques of Denial of Service Attacks in Wireless Sensor
Network.Procedia Computer Science,48(International Conference on Computer, Communication and Convergence (ICCC 2015), 387-393.
doi:10.1016/j.procs.2015.04.198
Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey.Computer networks,52(12), 2292-2330.
Images:
www.androidslots.co.uk/images/online-gaming.png
http://rack.1.mshcdn.com/media/ZgkyMDEyLzEyLzA0LzA2L29ubGluZWdhbWluLmJlZS5qcGcKcAl0aHVtYgk5NTB4NTM0IwplCWpwZw/518b994a/6dd/online-gaming-faceoffxbox-live-vs-playstation-network--5ae9d37533.jpg