COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
network
|
|
server
|
|
computer
|
|
keyboard
|
Detailed explanation-1: -A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
Detailed explanation-2: -A DDoS attack simply works like this: An attacker uses a number of machines across the internet (or what’s called a “botnet”). Those machines send a high volume of fake traffic as requests to the target site, all in an attempt to overload server resources and bring the site down.
Detailed explanation-3: -Many DDoS attack tools such as HTTP Unbearable Load King (HULK), Slowloris, PyLoris, DAVOSET, GodenEye, Open Web Application Security Project (OWASP) HTTP Post, Low Orbit ION Cannon (LOIC), High Orbit ION Cannon (HOIC), Xoic, Tor’s Hammer, DDoSSIM (DDoS Simulator) and RUDY (R-U-Dead-Yet) are freely available.
Detailed explanation-4: -Application layer attacks (a.k.a., layer 7 attacks) can be either DoS or DDoS threats that seek to overload a server by sending a large number of requests requiring resource-intensive handling and processing.