0% found this document useful (0 votes)
74 views2 pages

How To React: Possibly Saw This

The document outlines 5 phases of how a country would likely respond to a major DDoS attack that compromised its online infrastructure: Phase one would involve taking control of internet traffic to stop citizens from crashing internal infrastructure. Phase two would see security analysts working to understand and cope with the attack without disrupting internal networks. Phase three's challenge would be ensuring only high priority alerts from military, transport, energy, health and law enforcement systems reached analysts, while providing large-scale network control. Phase four focuses on lesser but still important financial and commercial systems. Phase five aims to restore normalcy by recovering any damaged systems as quickly as possible with minimal sustained damage. The overall goal is to overcome problems before infrastructure

Uploaded by

Arihant Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views2 pages

How To React: Possibly Saw This

The document outlines 5 phases of how a country would likely respond to a major DDoS attack that compromised its online infrastructure: Phase one would involve taking control of internet traffic to stop citizens from crashing internal infrastructure. Phase two would see security analysts working to understand and cope with the attack without disrupting internal networks. Phase three's challenge would be ensuring only high priority alerts from military, transport, energy, health and law enforcement systems reached analysts, while providing large-scale network control. Phase four focuses on lesser but still important financial and commercial systems. Phase five aims to restore normalcy by recovering any damaged systems as quickly as possible with minimal sustained damage. The overall goal is to overcome problems before infrastructure

Uploaded by

Arihant Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

How to react

If a country’s grid were taken down by an attack for any length of time, the ensuing
chaos would potentially be enough to win a war outright. If instead its online
infrastructure were substantially compromised by a DDoS attack, the response would
probably go like this:

Phase one: Takeover of network: the country’s security operations centre would
need to take control of internet traffic to stop its citizens from crashing the internal
infrastructure. We possibly saw this in the failed Turkish coup a few weeks ago, where
YouTube and social media went completely offline inside the country.

Phase two: Analysis of attack: security analysts would be trying to figure out how to
cope with the attack without affecting the internal operation of the network.

Phase three: Observation and large-scale control: the authorities would be faced
with countless alerts about system crashes and problems. The challenge would be to
ensure only key alerts reached the analysts trying to overcome the problems before the
infrastructure collapsed. A key focus would be ensuring military, transport, energy,
health and law enforcement systems were given the highest priority, along with financial
systems.

Phase four: Observation and fine control: by this stage there would be some
stability and the attention could turn to lesser but important alerts regarding things like
financial and commercial interests.

Phase five: Coping and restoring: this would be about restoring normality and
trying to recover damaged systems. The challenge would be to reach this phase as
quickly as possible with the least sustained damage.

WHAT ARE THE CYBER SECURITY TIPS

 You have never experienced a virus or malware attack. Most


malware conceals itself and its presence while stealing
information or controlling your computer.
 Pornographic sites are where the danger lies. The majority of
infected sites are bogus copies of trusted and ordinary websites
that have been created by malware hosts.
 An attachment needs to be downloaded to spread an
infection. Hackers now inject malicious code into web page
content that downloads automatically when viewing the page.
These tools are available in kits that are sold commercially.
 A lock icon in the browser means it is secure. This icon
represents an SSL-encrypted connection to protect the
interception of personal information but does not prevent
against malware. That’s why hackers emulate bank and credit
card sites complete with spoofed SSL certificates.

You might also like