ddos attack plan and steps in attack scenario viral vandal research should be used to support your content throughout the paper
Case Study
1. Why is it critical for an organization to have a DoS attack response plan well before it happens?
2. Use the four steps of the NIST computer security process to write a summary and analysis of each of the steps in a DDoS attack scenario.
a. Step 1 – Preparation: What steps would you take to prepare for this type of incident?
b. Step 2 – Detection and Analysis: Steps you would need to take in order to detect a potential DDoS incident and confirm if the incident is accurate
c. Step 3 – Containment Eradication and Recovery: What actions do you need to take to contain and recover from a DDoS incident
d. Step 4 – Post-Incident Activity – Describe the steps you would take post incident
Case Study Guidelines
Make sure to follow APA style. Please make sure your submission is 2 – 3 pages in length and meet the minimum APA formatting guidelines:
• 12-pt, Times New Roman font
• Double-spaced
• 1†margins on all sides
• Paraphrasing of content – Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.
• Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. If you need guidance or a refresher on this, please visit: https://owl.english.purdue.edu/owl/resource/560/10… (link is external) Be sure to include at least three (3) reputable sources.
• In-text citations – If you need additional guidance, please visit: https://owl.english.purdue.edu/owl/resource/560/02… (link is external)
Discussion
Read the open case scenario called viral vandal, describe the detection and analysis steps in this case. What would you do to contain and eradicate this threat?
Discussion Guidelines
DQ requirement: posting to be between 200-to-300 words. post must contain a properly formatted in-text citation and scholarly reference.