During a DoS incident, one possible containment strategy is to block the address the attacks are coming from. In addition, the organization may want to change its filtering strategy. What are the advantages and disadvantages of this approach?
What will be an ideal response?
Altering the filtering rules, either temporarily or permanently, may resolve the issue. Be aware of the possibility of service availability to legitimate customers. Also, the attacker may not only shift spoofed addresses, he may also shift source protocols. Also be aware that the more rules present in a device, the slower it will run. Thus, changing the organization's filtering strategy should only be done on a temporary, emergency basis if it causes issues. For long-term solutions, the organization may want to consider upgrades to critical network technologies to make such responses insignificant.
You might also like to view...
Which of the following cold-formed steel (CFS) sections is punched with holes?studs, tracks, bridging channels, and furring sections? What is the spacing of punched holes and the reason for it?
What will be an ideal response?
A manager is expected to fully understand ________.
A) How it should work B) How the business works C) How to keep it running D) All of the above
The heat that the cooling tower must reject from the water in the chiller is the cooling load of the conditioned area plus the heat of ____.
A. absorption B. compression C. vortexing D. cavitation
A(An) ________ is the time and distance between two consecutive points, either high or low
A) Wavelength B) Frequency C) Amplitude D) Period