1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RoseWind [281]
3 years ago
10

Explain how a Denial of Service (DoS) attack works. After describing a DoS conduct some research and provide an example of a rea

l company or website that was brought down by a DoS. What was the motive of the attackers).
Computers and Technology
1 answer:
Kay [80]3 years ago
3 0

Answer:                                                                                    

  • A Denial of Service(DoS) is a cyber attack in which the attacker makes a machine or network resource unavailable to its intended users by temporarily interrupting services of a host connected to the Internet.
  • It works by flooding the targeted system or resource with redundant requests or traffic to overload systems and prevent legitimate and valid requests from being accomplished.
  • Usually the user establishes a connection by sending a request to server to authenticate it and server responses back by giving authentication permission. This permission is acknowledged by the user and then is enabled on the server.
  • Contrary to this, in a DOS attach, users send multiple authentication requests to server and these requests contain wrong return addresses so server cant identify the user in order to send permission. The server waits for some time before attempting to close the connection but before it closes the connection the perpetrator sends new set of  false requests and this process starts again.
  • DOS attacks can slow network performance, makes a certain website unavailable and not accessible.
  • BBC was attacked with a DDoS attack measuring over 600 Gbps, The motive of the attackers who claimed responsibility, was that they were just “testing.”
  • The biggest DDoS attack happened to target GitHub. This politically motivated attack lasted several days and adapted itself around implemented DDoS mitigation strategies. The DDoS traffic initiated in China and it is suspected that the Chinese Government oversaw the attack.
  • Wikipedia was brought down by DDoS attack in Germany and some parts of Europe.  
  • TalkTalk a company which provides pay television, telecommunications, Internet access, and mobile network services to  costumers in the United Kingdom was brought down by DDoS attack   by a group of teenagers purely for their own entertainment.
  • In 2000 a 15-year-old hacker known as ‘Mafiaboy’ brought down several popular websites in the world including CNN,  eBay, and Yahoo, This attack had resulted chaos in stock market.  Attacker was revealed to be a high school student named Michael Calce, attacked by hacking into the networks of several universities and using their servers to perform DDoS attack. His motive was to intimidate other hacker groups.

You might be interested in
The first and second numbers in the Fibonacci sequence are both 1. After that, each subsequent number is the sum of the two prec
vlabodo [156]

Answer:

In Python:

def fib(nterms):

   n1, n2 = 1, 1

   count = 0

   while count < nterms:

       term = n1

       nth = n1 + n2

       n1 = n2

       n2 = nth

       count += 1

   return term

Explanation:

This line defines the function

def fib(nterms):

This line initializes the first and second terms to 1

   n1, n2 = 1, 1

This line initializes the Fibonacci count to 0

   count = 0

The following while loops gets the number at the position of nterms

<em>   while count < nterms: </em>

<em>        term = n1 </em>

<em>        nth = n1 + n2 </em>

<em>        n1 = n2 </em>

<em>        n2 = nth </em>

<em>        count += 1 </em>

This returns the Fibonnaci term

   return term

7 0
3 years ago
Xercise 1<br>1.<br>What is system? Explain the components of system in brief.​
noname [10]

Answer:

A system is a collection of elements or components that are organized for a common purpose. ... A computer system consists of hardware components that have been carefully chosen so that they work well together and software components or programs that run in the computer.

Explanation:

4 0
3 years ago
Which algorithm makes the most efficient use ofmemory?
SashulF [63]

Answer:

Best-fit Algorithm

Explanation:

Best-fit: Allocating the smallest memory location that is greater than or equal to the size of process.

<u>Example</u>

Let these are the memory locations-210kb,310kb,260kb,610kb

                    and size of processes-160kb,450kb,250kb,300kb

For the first-fit,

We allocate 160 kb to the 210kb memory location

Then, we allocate 450 kb to the 610kb because others don't have the size.

Then,we allocate 250kb to the 310 kb.

300 kb will stop,as no memory locations can execute.

For the Best-fit,

We allocate 160 kb to the 210kb memory location

Then,we allocate 450kb to the 610kb.

Then,we allocate 250kb to the  260kb not 310kb according to best-fit.

Then we allocate 300kb to the 310kb.

For the worst fit,

We allocate 160 kb to the 610kb memory location according to the worst-fit algorithm.

Then,we can't allocate 450kb to any memory location.

Then,we allocate 250kb to the 310kb .

We can' allocate 300kb in 260kb memory location.

As we can see from this example that in First-fit algorithm 300kb process will stop as no memory location is there.

In worst-fit algorithm ,We can't allocate 450kb,300kb to any memory locations.

In Best-fit algorithm,we can allocate the process to each location,so this algorithm is using memory in a efficient way.    

5 0
3 years ago
Friedman (1999) argues that "we are wrong to base health promotion in all societies on a Western framework for human development
Dovator [93]

Answers with Explanation:

A. Give at least two reasons why he believes this.

Friedman believes that health promotion based on Western framework for human development<em> unfairly criticizes the other cultures in the society.</em> Western framework values intellectual and economic achievements alone, which then <em>results to putting a great expense on the other essential human qualities.</em>

B. What crisis does he believe is happening in the most economically developed countries?

The crisis that is happening in the most economically developed country is the <em>devaluing of the other aspects which other human beings value in terms of individuality or families.</em>

C. What does he recommend to improve the programming for adolescent health?

He recommends that if changes were to be implemented for adolescent's health, <u>these have to be properly assessed regarding their effect on the adolescent's development,</u> including his/her family and other social relationships. Next is to check whether<u> it doesn't conflict with the adolescent's culture in the community that he belongs</u>. If it does, then it is essential to change it or find <em>another way which fosters</em><em> </em><em>the same goal.</em>

7 0
3 years ago
Why is a memory hierarchy of different memory types used instead of only one kind of memory?
Kipish [7]

Answer: Memory hierarchy is the hierarchy that is created on the basis of the response time of different memories. The performance obtained by the memory helps in creating a computer storage space in distinguished form. The factors considered for the creating of the hierarchy structure are usually response time, storage capacity, complexity etc.

Usage of different kind of memories take place due to different kind of requirements from the system which cannot be fulfilled using one memory device.The requirement is based on saving time, decreasing complexity , improving performance etc.Example of requirements can be like some functions and files do not require much space , some might require quick accessing,etc.

Thus hierarchy of any particular system is in the form of fast to slow order from registers,cache memory, Random access memory(RAM) and secondary memory.

5 0
3 years ago
Other questions:
  • Within the hardware of the personal computer temporary memory is known as
    10·2 answers
  • If I put a short clip from a copyrighted video to Facebook and make it only viewable to friends, is that illegal?
    12·1 answer
  • You have a Bluetooth headset that integrates with your computer so that you can talk to partners through Microsoft Lync. This is
    6·2 answers
  • Generally considered to be the most important information security policies, what item below defines the actions a user may perf
    11·1 answer
  • John was carrying on at the water cooler the other day, trying to show off his knowledge of networking. He claimed that the comp
    10·1 answer
  • Which option will automatically update copied data?
    12·2 answers
  • What are the defenses to protect against these attacks?
    13·1 answer
  • Please help explain this calculator code.
    15·1 answer
  • In English there are five vowel letters in the alphabet: A, E, I, O, U. For the purposes of this exercise we won't count Y as a
    5·1 answer
  • you are setting up an active directory environment for a business that has three locations and 300 users. you want the users to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!