Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 2: ATTACKS (DENIAL-OF-SERVICE (DDoS ATTACK (Example DDoS attack:,…
CHAPTER 2: ATTACKS
DENIAL-OF-SERVICE
Denial of service implies that an attacker disables or corrupts networks, systems, or services with the intent to deny services to intended users
DoS attacks involve either crashing the system or slowing it down to the point that it is unusable. But DoS can also be as simple as deleting or corrupting information
-
-
DDoS ATTACK
DDoS attacks are designed to saturate network links with spurious data. This data can overwhelm an Internet link, causing legitimate traffic to be dropped
DDoS uses attack methods similar to standard DoS attacks but operates on a much larger scale. Typically hundreds or thousand of attack points attempt to overwhelm a target
-
MALICIOUS CODE
Malicious software is inserted onto a host to damage a system; corrupt a system; replicate itself; or deny services or access to network, systems or services
-
MALICIOUS CODE ATTACK
The primary vulnerabilities for end-user workstations are worm, virus, and Trojan horse attacks
- An application written to look like something else that in fact is an attack tool
- An application that executes arbitrary code and installs copies of itself in the memory of the infected computer, which then infects other hosts
Malicious software that is attached to another program to execute a particular unwanted function on the user workstation