COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which apply to a DDOS attack?
A
an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources
B
a way to hack into a network so you can run SQL code
C
A method used by hackers to track what users enter on their keyboard to steal personal information and passwords
D
Will often create a botnet to increase the amount of traffic being created
E
Will allow you to steal someone’s website and use it for yourself
Explanation: 

Detailed explanation-1: -This category of attacks attempts to create congestion by consuming all available bandwidth between the target and the larger Internet. Large amounts of data are sent to a target by using a form of amplification or another means of creating massive traffic, such as requests from a botnet.

Detailed explanation-2: -Botnets are groups of internet-connected devices that have been infected with malware and hijacked by threat actors to do their bidding. The malware enables the threat actor to control the device from a remote location without the knowledge of the rightful owner of the device.

Detailed explanation-3: -Many DDoS attack tools such as HTTP Unbearable Load King (HULK), Slowloris, PyLoris, DAVOSET, GodenEye, Open Web Application Security Project (OWASP) HTTP Post, Low Orbit ION Cannon (LOIC), High Orbit ION Cannon (HOIC), Xoic, Tor’s Hammer, DDoSSIM (DDoS Simulator) and RUDY (R-U-Dead-Yet) are freely available.

Detailed explanation-4: -DDoS attacks use an army of zombie devices called a botnet. These botnets generally consist of compromised IoT devices, websites, and computers.

Detailed explanation-5: -The idea behind using botnets for DDoS attacks is to overwhelm a target server with a massive number of requests (from the zombie devices) to crash, or at least slow down, the server significantly. DDoS is one of the most common ways botnets are utilized in criminal attacks, and often the most dangerous.

There is 1 question to complete.