FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
When computer systems are infected and taken control of, then used to send high volumes of traffic to a specific destination to shut down the service.
A
Botnet
B
DDOS
C
Malware
D
Spyware
Explanation: 

Detailed explanation-1: -A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

Detailed explanation-2: -A good practice is to use a Web Application Firewall (WAF) against attacks, such as SQL injection or cross-site request forgery, that attempt to exploit a vulnerability in your application itself.

Detailed explanation-3: -The term botnet is a portmanteau from the words robot and network and each infected device is called a bot. Botnets can be designed to accomplish illegal or malicious tasks including sending spam, stealing data, ransomware, fraudulently clicking on ads or distributed denial-of-service (DDoS) attacks.

Detailed explanation-4: -DDoS (Distributed Denial of Service) is a category of malicious cyber-attacks that hackers or cybercriminals employ in order to make an online service, network resource or host machine unavailable to its intended users on the Internet.

Detailed explanation-5: -Reroute traffic through firewalls or add device firewalls to block attacks. Apply stronger rate limits to firewalls, servers, and other resources protecting and servicing the router or server. Add or strengthen network security products, network intrusion detection systems (IDS), and intrusion prevention systems (IPS).

There is 1 question to complete.