<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<style type="text/css" style="display:none;"><!-- P {margin-top:0;margin-bottom:0;} --></style>
</head>
<body dir="ltr">
<div id="divtagdefaultwrapper" style="font-size:12pt;color:#000000;font-family:Calibri,Helvetica,sans-serif;" dir="ltr">
<p style="margin-top:0;margin-bottom:0">Okay. Let's try this again...</p>
<p style="margin-top:0;margin-bottom:0"><br>
</p>
<p style="margin-top:0;margin-bottom:0">Here's a link to a "DDoS Quick Guide" provided by the Department of Homeland Security:</p>
<p style="margin-top:0;margin-bottom:0"><br>
</p>
<p style="margin-top:0;margin-bottom:0"><a href="https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf" class="OWAAutoLink" id="LPlnk954174" previewremoved="true">https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf</a></p>
<p style="margin-top:0;margin-bottom:0"><br>
</p>
<p style="margin-top:0;margin-bottom:0">It provides a chart of attack possibilities by OSI layer and gives examples of denial of service (DOS) attacks techniques at each level. These attacks impact the availability of resources and if successful will render
them unavailable. </p>
<p style="margin-top:0;margin-bottom:0"><br>
</p>
<p style="margin-top:0;margin-bottom:0">The chart also includes mitigation options for the attack types (related to Blue Team's mission). </p>
<p style="margin-top:0;margin-bottom:0"><br>
</p>
<p style="margin-top:0;margin-bottom:0"><br>
</p>
<p style="margin-top:0;margin-bottom:0"><br>
</p>
<p style="margin-top:0;margin-bottom:0">Professor, </p>
<p style="margin-top:0;margin-bottom:0"><br>
</p>
<p style="margin-top:0;margin-bottom:0">Are links like these acceptable? Or do you prefer articles?</p>
<p style="margin-top:0;margin-bottom:0"><br>
</p>
<p style="margin-top:0;margin-bottom:0"><br>
</p>
</div>
<hr style="display:inline-block;width:98%" tabindex="-1">
<div id="divRplyFwdMsg" dir="ltr"><font face="Calibri, sans-serif" style="font-size:11pt" color="#000000"><b>From:</b> cs615asa-bounces@lists.stevens.edu <cs615asa-bounces@lists.stevens.edu> on behalf of Jan Schaumann <jschauma@stevens.edu><br>
<b>Sent:</b> Monday, February 25, 2019 1:23:01 PM<br>
<b>To:</b> cs615asa@lists.stevens.edu<br>
<b>Subject:</b> Re: [cs615asa] Red Team Link Week 5</font>
<div> </div>
</div>
<div class="BodyFragment"><font size="2"><span style="font-size:11pt;">
<div class="PlainText">Rosanna D Pangelinan <rpangeli@stevens.edu> wrote:<br>
<br>
> Here's some info on the Key Reinstallation Attack, aka as KRACK, which<br>
> is an attack on the Wi-Fi Protected Access II (WPA2) security protocol<br>
<br>
The weekly links should be *directly related* to either the topic of the<br>
previous lecture, or the upcoming lecture. That is, you should research<br>
what we covered or will cover, and find a relevant link or topic.<br>
<br>
While we'll be talking about networking in general, WAP and WiFi are not<br>
on topic here. Please review the slides and recommended reading<br>
materials and submit a more suitable link.<br>
<br>
-Jan<br>
_______________________________________________<br>
cs615asa mailing list<br>
cs615asa@lists.stevens.edu<br>
<a href="https://lists.stevens.edu/mailman/listinfo/cs615asa">https://lists.stevens.edu/mailman/listinfo/cs615asa</a><br>
</div>
</span></font></div>
</body>
</html>