Please enable JavaScript.
Coggle requires JavaScript to display documents.
Information Security in the new era (DDoS attack - Distributed Denial of…
Information
Security in the new era
DDoS attack - Distributed Denial of Service
Types
Bandwidth attacks
overloads the target with massive amounts of junk data
Application attacks
Application-layer data messages can deplete resources in the application layer, leaving the target's system services unavailable.
Traffic attacks
Traffic flooding attacks send a huge volume of TCP, UDP and ICPM packets to the targe
Global attacks distributed via botnets , they uses multiple computers and connections
Zero-knowledge proof
method
THE PROVER (A) can prove to THE VERIFIER (B) that they know a value x (PASSWORD)
without conveying any information apart from the fact that they know the value x
zero day exploit
occurs on the same day a weakness is discovered in software
It is exploited before there is a solution available from your developer
Hijacking Internet Traffic
is the illegitimate takeover of groups of IP addresses
using
Border Gateway Protocol (BGP)