1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
3 years ago
11

Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping

flood attacks where the attacker is trying to consume bandwidth. Describe an effective defense against such an attack. Your answer must have enough detail to show that you understand the concept.
Computers and Technology
1 answer:
tresset_1 [31]3 years ago
6 0

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

You might be interested in
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have b
PilotLPTM [1.2K]

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>

8 0
3 years ago
An employee sets up an automation that transfers files in a specific folder on their PC to a remote drive for archiving, provide
Yuri [45]

Answer:

Rule based automation

Explanation:

8 0
2 years ago
How do i set up a RAID 1 array?​
KiRa [710]

are you using windows? linux? mac?

3 0
3 years ago
Having knowledge of the main parts of a computer: CPU, ALU, INPUT, OUTPUT ,and MEMORY Can you explain in simple for dummies what
Morgarella [4.7K]

Answer:

Explanation:

Great question, it is important to ask these questions in order to get rid of any doubts you may be having.

I will explain this as simply as possible in separate parts.

CPU: the CPU is the brain of the computer where all the information is received, processed, and sent from.

ALU: are the digital circuits inside the CPU used to perform all the arithmetic and logic operations

INPUT: are the commands given to the computer by the user.

OUTPUT: is the information displayed on the screen by the computer.

Memory: is the piece of hardware used to save all the information that is currently being used by the computer.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Which country does coriander come from
lawyer [7]
Coriander comes from<span> Morocco and Romania</span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • Americans overwhelmingly support organ and tissue donation.
    5·1 answer
  • Explain why the control bus is not a bus.
    7·1 answer
  • Why is the len ( ) function useful when using a loop to iterate through a stack?
    6·1 answer
  • Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
    10·1 answer
  • Which of the following are characteristics of a cell
    12·1 answer
  • A photograph is taken by letting light fall on a light-sensitive medium, which then records the image onto that medium.
    12·2 answers
  • Someone who wants to learn a skilled trade on the job should consider
    6·2 answers
  • An EULA usually takes the form of an electronic notification that appears when installing software. The user then has a choice t
    14·1 answer
  • How to get someone off your best friends list without blocking them
    8·1 answer
  • How to count the total number of users from backend reactjs.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!