This is a paper that is focusing on the secure design diagrams that minimize distributed denial of service attacks risk. The paper also provides additional information to use in the writing of the assignment paper. Below is the assessment description to follow:
This phase of the project must include the secured design diagrams that minimize risk and also appropriately address the threats identified in Project 1: Problem Identification Assignment.
Threats from “distributed denial of service attacks” – include semantic attacks and brute force attacks. And also Man in the middle attack from include semantic attacks and brute force attacks.
Any single points of failure must be with appropriate fault-tolerant designs. Solutions must parallel the analyzed solutions. For example, if vulnerability was determined between 2 network gateways. Additionally, a solution could include a virtual private network (VPN) with appropriate public key infrastructure (PKI) and certificates. If a man-in-the-middle network attack is a threat, Dynamic ARP Inspection and DHCP Snooping features on networking equipment can be indicated in the network design diagram to prevent these attacks.
Instructions
Each design must be justified by the textbook and also peer-reviewed research. Evaluation will be basing upon the appropriate security solutions to the identified problem. The final design must seek to construct the appropriate controls for the target given various, regularly used vulnerabilities.
For example, if the target is availability and the vulnerability is connection flooding (e.g. SYN flood), appropriately designed solutions would likely include the minimum controls of an intrusion detection system (IDS), firewall, access control list (ACL) on the border gateway/router, and also a honeypot to counteract unauthorized attempts. A design diagram must properly illustrate this secured solution, and the author must subsequently explain each dimension of the security strategy.
Current and proper APA formatting is and must include a title page, proper margins, citations, organization, proper grammar and spelling, and an ending resources page.
At the minimum, this phase of the project must include:
I. Executive summary and introduction
II. Systems Design