COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
DoS/DDoS
|
|
Spoofing
|
|
Man-in-the-middle
|
|
DNS poisoning
|
Detailed explanation-1: -A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
Detailed explanation-2: -The sole purpose of a DDoS attack is to overload the website resources. However, DDoS attacks can be used as a way of extortion and blackmailing. For example, website owners can be asked to pay a ransom for attackers to stop a DDoS attack.
Detailed explanation-3: -A distributed denial-of-service (DDoS) attack occurs when a group of systems flood a server with fraudulent traffic. Eventually, the server is overwhelmed, causing it to either go down, or become unresponsive, even to legitimate requests.
Detailed explanation-4: -A TCP SYN flood DDoS attack occurs when the attacker floods the system with SYN requests in order to overwhelm the target and make it unable to respond to new real connection requests. It drives all of the target server’s communications ports into a half-open state.
Detailed explanation-5: -A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.