Order for this Paper or similar Assignment Help Service

Fill the order form in 3 easy steps - Less than 5 mins.

Posted: September 9th, 2022

Crimes Related to Hacking into Servers: Denial of Service Attacks

Computer Sciences and Information Technology
Topic:
]

Crimes Related to Hacking into Servers: Denial of Service Attacks
You must write a 4-6 page term paper on a topic of your choice related to cybercrime (ALL TOPICS MUST BE APPROVED). Some examples would include, how to avoid being a victim of cybercrime, the laws surrounding cybercrime, a recent incident related to cybercrime or pick an individual cybercrime and discuss the impact this crime has on society. Please write the term paper in a Word document and then upload it for grading.
Your term paper outline is due at the end of Week 2.
Your term paper is due at the end of Week 8.
In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
When submitting the paper, it will automatically run through Turnitin for review. You must write a 4-6 page term paper on a topic of your choice related to cybercrime (ALL TOPICS MUST BE APPROVED). Some examples would include, how to avoid being a victim of cybercrime, the laws surrounding cybercrime, a recent incident related to cybercrime or pick an individual cybercrime and discuss the impact this crime has on society. Please write the term paper in a Word document and then upload it for grading.
Your term paper outline is due at the end of Week 2.
Your term paper is due at the end of Week 8.
In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
When submitting the paper, it will automatically run through Turnitin for review.
American Military University

Denial of Service Attacks
Outline
Introduction
• What is Denial of Service Attacks
• Why mis Denial of Service Attacks (DoS) an important topic when it comes to crimes related to hacking into servers.
• The mechanism employed in DoS attack
Literature Review
• Definition of Denial of Service Attacks (DoS)
• Detecting Denial of Service Attacks (DoS)
• Most Famous DoS Attacks.
• How to resolve Denial of Service Attacks (DoS)
Research Question
• How to identify and deal with Denial of Service Attacks (DoS) as part of the crimes related to hacking into servers.
Methodology
• Use of literature sources from databases associated with information technology studies.

Proposal
For a long time, computer hacking has been a key subject in the are of information technology. This is because of the effects associated with hacking of systems, which may be detrimental to the objectives of the establishments. DoS is a form of computer hacking that involves disruption of a network system (Hui, Kim & Wang, 2017). DoS is an important topic when it comes to crimes related to hacking into servers because it is the form of attack utilized by hackers to disrupt services within the target network. In this case, the network or server is commanded to authenticate request with wrong addresses.
Literature Review
As pointed out before Denial of Service Attacks (DoS) is a form of hacking in which the attackers assume control of a server or a network system. This is to mean that such attacks prevent the original server usesr from getting the appropriate services by making the server ever busy on authenticating requests with invalid return addresses (Shaar & Efe, 2018). A number of ways have been evolved in order to detect events associated with Denial of Service Attacks (DoS) within networks or servers. Some of the most common strategies employed in the detection of Denial of Service Attacks include activity profiling, change-point detection, and wavelet-based signal analysis (Carl, Kesidis, Brooks & Rai, 2006). However, it is noteworthy pointing out that it is important to combine a number of strategies in the detection process as there is no proven efficient method.
DoS is associated with serious security breaches with unquantifiable implications and some of the recent and famous DoS attacks include GitHub: 1.35 Tbps on Feb. 28, 2018, Occupy Central, Hong Kong: 500 Gbps in 2014, CloudFlare: 400 Gbps in 2014, Spamhaus: 300 Gbps in 2013 and U.S. Banks: 60 Gbps in 2012. Of more significance is that there are a number of measures that can be employed to overcome DoS attacks within servers or network systems. These include expansion of bandwidth to handle spikes in traffic, building redundancy by spreading data across multiple centres, configuring network hardware against DoS attacks, use of anti-DoS hardware and software modules and protecting servers to bringing them offline (Bhattacharyya & Kalita, 2016).
Research Question
The primary research question answered by this proposal is; how to identify and deal with Denial of Service Attacks (DoS) as part of the crimes related to hacking into servers.
Methodology
In order to answer the study question arising from this proposal, literature search will be conducted from databases associated with studies on information technology. Google search will also be conducted to find cases relevant to the topic of study.

References
Bhattacharyya, D. K., & Kalita, J. K. (2016). DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. CRC Press.
Carl, G., Kesidis, G., Brooks, R.R & Rai, S. (2006). Denial-of-service attack-detection techniques. IEEE Internet Computing, vol. 10, no. 1, pp. 82-89.
doi: 10.1109/MIC.2006.5
Hui, K.-L., Kim, S. H., & Wang, Q.-H. (2017). Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks. MIS Quarterly, 41(2), 497-A11.
Shaar, F., & Efe, A. (2018). DDoS Attacks and Impacts on Various Cloud Computing Components. International Journal of Information Security Science, 7(1), 26.

Order | Check Discount

Tags: best custom paper writing service, best paper writing services, help writing papers for college, paper help writers term write, paper writing help free, pay people to write papers

Assignment Help For You!

Special Offer! Get 20-30% Off on Every Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the finest writers are selected to be a part of our team, with each possessing specialized knowledge in specific subjects and a background in academic writing..

Affordable Prices

We balance affordability with exceptional writing standards by offering student-friendly prices that are competitive and reasonable compared to other writing services.

100% Plagiarism-Free

We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you opt to place an order with Nursing StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We assess your order and pair it with a custom writer who possesses the specific qualifications for that subject. They then start the research/write from scratch.

Order in Progress and Delivery

You and the assigned writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also peruse testimonials from other clients. From several options, you can select your preferred writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00