Boost Your Final Grades By Ordering Custom Writing Help!

For similar papers and sample answers; with a few clicks, Order your research paper, thesis, dissertation writing and other assignment help services

Posted: August 22nd, 2022

Crimes Related to Hacking into Servers: Denial of Service Attacks

Computer Sciences and Information Technology
Topic:
]

Crimes Related to Hacking into Servers: Denial of Service Attacks
You must write a 4-6 page term paper on a topic of your choice related to cybercrime (ALL TOPICS MUST BE APPROVED). Some examples would include, how to avoid being a victim of cybercrime, the laws surrounding cybercrime, a recent incident related to cybercrime or pick an individual cybercrime and discuss the impact this crime has on society. Please write the term paper in a Word document and then upload it for grading.
Your term paper outline is due at the end of Week 2.
Your term paper is due at the end of Week 8.
In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
When submitting the paper, it will automatically run through Turnitin for review. You must write a 4-6 page term paper on a topic of your choice related to cybercrime (ALL TOPICS MUST BE APPROVED). Some examples would include, how to avoid being a victim of cybercrime, the laws surrounding cybercrime, a recent incident related to cybercrime or pick an individual cybercrime and discuss the impact this crime has on society. Please write the term paper in a Word document and then upload it for grading.
Your term paper outline is due at the end of Week 2.
Your term paper is due at the end of Week 8.
In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
When submitting the paper, it will automatically run through Turnitin for review.
American Military University

Denial of Service Attacks
Outline
Introduction
• What is Denial of Service Attacks
• Why mis Denial of Service Attacks (DoS) an important topic when it comes to crimes related to hacking into servers.
• The mechanism employed in DoS attack
Literature Review
• Definition of Denial of Service Attacks (DoS)
• Detecting Denial of Service Attacks (DoS)
• Most Famous DoS Attacks.
• How to resolve Denial of Service Attacks (DoS)
Research Question
• How to identify and deal with Denial of Service Attacks (DoS) as part of the crimes related to hacking into servers.
Methodology
• Use of literature sources from databases associated with information technology studies.

Proposal
For a long time, computer hacking has been a key subject in the are of information technology. This is because of the effects associated with hacking of systems, which may be detrimental to the objectives of the establishments. DoS is a form of computer hacking that involves disruption of a network system (Hui, Kim & Wang, 2017). DoS is an important topic when it comes to crimes related to hacking into servers because it is the form of attack utilized by hackers to disrupt services within the target network. In this case, the network or server is commanded to authenticate request with wrong addresses.
Literature Review
As pointed out before Denial of Service Attacks (DoS) is a form of hacking in which the attackers assume control of a server or a network system. This is to mean that such attacks prevent the original server usesr from getting the appropriate services by making the server ever busy on authenticating requests with invalid return addresses (Shaar & Efe, 2018). A number of ways have been evolved in order to detect events associated with Denial of Service Attacks (DoS) within networks or servers. Some of the most common strategies employed in the detection of Denial of Service Attacks include activity profiling, change-point detection, and wavelet-based signal analysis (Carl, Kesidis, Brooks & Rai, 2006). However, it is noteworthy pointing out that it is important to combine a number of strategies in the detection process as there is no proven efficient method.
DoS is associated with serious security breaches with unquantifiable implications and some of the recent and famous DoS attacks include GitHub: 1.35 Tbps on Feb. 28, 2018, Occupy Central, Hong Kong: 500 Gbps in 2014, CloudFlare: 400 Gbps in 2014, Spamhaus: 300 Gbps in 2013 and U.S. Banks: 60 Gbps in 2012. Of more significance is that there are a number of measures that can be employed to overcome DoS attacks within servers or network systems. These include expansion of bandwidth to handle spikes in traffic, building redundancy by spreading data across multiple centres, configuring network hardware against DoS attacks, use of anti-DoS hardware and software modules and protecting servers to bringing them offline (Bhattacharyya & Kalita, 2016).
Research Question
The primary research question answered by this proposal is; how to identify and deal with Denial of Service Attacks (DoS) as part of the crimes related to hacking into servers.
Methodology
In order to answer the study question arising from this proposal, literature search will be conducted from databases associated with studies on information technology. Google search will also be conducted to find cases relevant to the topic of study.

References
Bhattacharyya, D. K., & Kalita, J. K. (2016). DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. CRC Press.
Carl, G., Kesidis, G., Brooks, R.R & Rai, S. (2006). Denial-of-service attack-detection techniques. IEEE Internet Computing, vol. 10, no. 1, pp. 82-89.
doi: 10.1109/MIC.2006.5
Hui, K.-L., Kim, S. H., & Wang, Q.-H. (2017). Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks. MIS Quarterly, 41(2), 497-A11.
Shaar, F., & Efe, A. (2018). DDoS Attacks and Impacts on Various Cloud Computing Components. International Journal of Information Security Science, 7(1), 26.

Check Price Discount

Study Notes, Research Topics & Assignment Examples: »

Why Choose our Custom Writing Services

We prioritize delivering top quality work sought by college students.

Top Research Professionals

The research experts and assignment help team consists exclusively of highly qualified graduate writers, each professional with in-depth subject matter expertise and significant experience in custom academic writing.

Discounted Pricing

Our custom writing services maintain the highest quality while remaining affordable for students. Our pricing for research papers, theses, and dissertations is not only fair considering the superior quality but also competitive with other writing services.

0% Similarity Index

We guarantee plagiarism-free, human-written content. Every product is assured to be original and not AI-generated. Our writers, tutors and editors are research experts who ensures the right formating and citation sytles are followed. To note, all the final drafts undergo rigorous plagiarism checks before delivery for submission to ensure authenticity for our valued customers.

How it works

When you decide to place an order with Dissertation Help, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We analyze your order and match it with a custom writer who has the unique qualifications for that subject, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.

Write My Paper