{"id":10,"date":"2023-03-08T10:39:05","date_gmt":"2023-03-08T15:39:05","guid":{"rendered":"https:\/\/community.mis.temple.edu\/jdaniel\/blog\/points\/learn-ethical-hacking-techniques-to-mitigate-cyber-attacks-in-40-minutes\/"},"modified":"2023-03-08T10:39:05","modified_gmt":"2023-03-08T15:39:05","slug":"learn-ethical-hacking-techniques-to-mitigate-cyber-attacks-in-40-minutes","status":"publish","type":"points","link":"https:\/\/community.mis.temple.edu\/jdaniel\/points\/learn-ethical-hacking-techniques-to-mitigate-cyber-attacks-in-40-minutes\/","title":{"rendered":"Learn Ethical Hacking Techniques to Mitigate Cyber Attacks in 40 Minutes"},"content":{"rendered":"<p>By partaking in this webinar I gained a substantial amount of knowledge about protection against DDoS attacks. The early stages of the webinar highlighted common types of attacks like p<span class=\"TextRun SCXW219460988 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW219460988 BCX0\">ing of death, smurf attacks, or multi vector<span class=\"TextRun SCXW19769748 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW19769748 BCX0\"> attacks and described their functionality. Additionally, common tools used for DDoS attacks were explained as well. Detection techniques were discussed afterwards; for instance defining normal traffic creates a baseline that you can constantly check for any abnormalities. Some strategies to mitigate attacks could be degrading the service to its core functionalities or just shutting down the entire site until attacks subside, but those are some simple methods. It is also very important to analyze an attack and the aftermath to prevent a similar situation in the future.<\/span><\/span><\/span><\/span><\/p>\n","protected":false},"author":28046,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-10","points","type-points","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/points\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/points"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/types\/points"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/users\/28046"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":0,"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/points\/10\/revisions"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/jdaniel\/wp-json\/wp\/v2\/media?parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}