I aspire to contribute to the growth and legacy of academia through teaching, research, publication, and grantsmanship Supervisors: Michelle Peterson, Ph.D. Phone: 340-692-4286 Address: Alfred A Sheen Campus RR1 Box 10000 Kingshill, V.I. 00850-9781
Thank you for joining this session to review the DDoS scenario and use of industry best practices... more Thank you for joining this session to review the DDoS scenario and use of industry best practices to prevent such attacks of campus systems. As a public university, extending resources to constituents online ensures the campus will keep pace with 21 st Century higher education, and fulfill essential elements of the strategic mission. For this reason, an executive summary was provided to campus leadership to present essentials of the event, challenges, and initial recommendations. It is understandable the scope of review will differ for sessions held with campus administration, the technology staff, and users. However, coordinated and effective remedies will depend critically upon consistent, congruent references, concepts, and perceptions. Therefore, the first section of this review will cover essentials of the executive summary. The official document of record includes a single diagram of the DDoS attack, drawn in a circular series of distinct stages. When presented live, a few slides showed this same progression in layers.
Thank you for joining this session to review the DDoS scenario and use of industry best practices... more Thank you for joining this session to review the DDoS scenario and use of industry best practices to prevent such attacks of campus systems. As a public university, extending resources to constituents online ensures the campus will keep pace with 21 st Century higher education, and fulfill essential elements of the strategic mission. For this reason, an executive summary was provided to campus leadership to present essentials of the event, challenges, and initial recommendations. It is understandable the scope of review will differ for sessions held with campus administration, the technology staff, and users. However, coordinated and effective remedies will depend critically upon consistent, congruent references, concepts, and perceptions. Therefore, the first section of this review will cover essentials of the executive summary. The official document of record includes a single diagram of the DDoS attack, drawn in a circular series of distinct stages. When presented live, a few slides showed this same progression in layers.
Uploads
Drafts by TChristian Kentopp