COMPILER DESIGN

ADVANCED TOPICS IN COMPILER DESIGN

CODE GENERATION FOR OBJECT ORIENTED LANGUAGES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which one of the five pillars of cybersecurity is the following example a violation of:Access to a company’s Web site is slowed because of a denial of service (DoS) attack.
A
Authentication
B
Availability
C
Confidentiality
D
Integrity
E
Nonrepudiation
Explanation: 

Detailed explanation-1: -There are two general methods of DoS attacks: flooding services or crashing services. Flood attacks occur when the system receives too much traffic for the server to buffer, causing them to slow down and eventually stop. Popular flood attacks include: Buffer overflow attacks – the most common DoS attack.

Detailed explanation-2: -These multi-person, multi-device barrages are generally harder to deflect, mostly due to the sheer volume of devices involved. Unlike single-source DoS assaults, DDoS attacks tend to target the network infrastructure in an attempt to saturate it with huge volumes of traffic.

Detailed explanation-3: -Attackers achieve this by sending more traffic than the target can handle, causing it to fail-making it unable to provide service to its normal users. Examples of targets might include email, online banking, websites, or any other service relying on a targeted network or computer.

Detailed explanation-4: -Distributed denial of service attack (DDoS) definition A distributed denial of service (DDoS) attack is a malicious attempt to make an online service unavailable to users, usually by temporarily interrupting or suspending the services of its hosting server.

There is 1 question to complete.