How should the target of such a massive DDOS attack deal with the attack and minimize damage
Hi everyone, as the discussion leader this week, I’m posting my favorite cyber security news article of the week and adding a few questions for our group discussion. The article is “The Inevitability of Being Hacked,” The Atlantic, on October 28, 2016:
http://www.theatlantic.com/technology/archive/2016…
I love this article because the author brings to life the massive DDOS from 2 weeks ago through the Internet of Things. In the article, the author describes how he rented a small server on Amazon, set up what appeared to be an unsecured web device that he called an “internet toaster”–essentially set up a honeypot–and experienced his first hack attempt just 40 minutes later. Bots tried different IP address and different typical passwords, like default passwords for electronic equipment, and were unsuccessful. However, the hacks were successful weeks ago or else there would not have been an IoT DDOS attack that made the news.
How should the target of such a massive DDOS attack deal with the attack and minimize damage or opportunity cost of shutting down a website or device?
How can manufacturers of Internet of Things devices prevent this from happening in the future?
Are there more sinister uses of controlling Internet of Things than just directing a DDOS attack? Can Internet of Things be controlled to do more physically dangerous things?
preview of the answer..
On Friday October 21, 2016, major web pages were not accessible to people across a large part of the United States because a company that manages vital parts of the Internet’s infrastructure was attacked. In an article titled “The Inevitability of Being Hacked” published in The Atlantic, McGill (2016) states that a large number of the hacked computers were not the laptops and desktops that are normally targeted, but rather the web-connected devices such as security cameras and video recorders. The author describes how he rented a small server on Amazon, set up what appeared to be an unsecured web device that he called an “internet toaster,” and experienced hacks within a few minutes. The author uses this experiment to demonstrate the ease and high possibility of being hacked using the Internet of Things devices. In light of this, this essay discusses..
APA 592 words