1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RoseWind [281]
4 years ago
10

Explain how a Denial of Service (DoS) attack works. After describing a DoS conduct some research and provide an example of a rea

l company or website that was brought down by a DoS. What was the motive of the attackers).
Computers and Technology
1 answer:
Kay [80]4 years ago
3 0

Answer:                                                                                    

  • A Denial of Service(DoS) is a cyber attack in which the attacker makes a machine or network resource unavailable to its intended users by temporarily interrupting services of a host connected to the Internet.
  • It works by flooding the targeted system or resource with redundant requests or traffic to overload systems and prevent legitimate and valid requests from being accomplished.
  • Usually the user establishes a connection by sending a request to server to authenticate it and server responses back by giving authentication permission. This permission is acknowledged by the user and then is enabled on the server.
  • Contrary to this, in a DOS attach, users send multiple authentication requests to server and these requests contain wrong return addresses so server cant identify the user in order to send permission. The server waits for some time before attempting to close the connection but before it closes the connection the perpetrator sends new set of  false requests and this process starts again.
  • DOS attacks can slow network performance, makes a certain website unavailable and not accessible.
  • BBC was attacked with a DDoS attack measuring over 600 Gbps, The motive of the attackers who claimed responsibility, was that they were just “testing.”
  • The biggest DDoS attack happened to target GitHub. This politically motivated attack lasted several days and adapted itself around implemented DDoS mitigation strategies. The DDoS traffic initiated in China and it is suspected that the Chinese Government oversaw the attack.
  • Wikipedia was brought down by DDoS attack in Germany and some parts of Europe.  
  • TalkTalk a company which provides pay television, telecommunications, Internet access, and mobile network services to  costumers in the United Kingdom was brought down by DDoS attack   by a group of teenagers purely for their own entertainment.
  • In 2000 a 15-year-old hacker known as ‘Mafiaboy’ brought down several popular websites in the world including CNN,  eBay, and Yahoo, This attack had resulted chaos in stock market.  Attacker was revealed to be a high school student named Michael Calce, attacked by hacking into the networks of several universities and using their servers to perform DDoS attack. His motive was to intimidate other hacker groups.

You might be interested in
Candace opened an email from a person she didn't know and clicked on a pop-up in the email that installed a virus on her compute
Minchanka [31]

Answer:

Shut down the computer.

Explanation:

l hope it help

4 0
3 years ago
Read 2 more answers
If you reformat the hard drive on a computer, it erases all personal information from your computer and makes it safe to donate.
melamori03 [73]
The answer would be false
8 0
4 years ago
What makes it possible for e-mail to be sent and received on a wide variety of devices, including cell phones, PDAs, laptops, an
Usimov [2.4K]

Answer:

Compatibility.

Explanation:

Email or electronic mail is a messaging system that allows for transmission of digital or electronic mails to computers within and to other networks through the internet.

Email applications are web based applications and are hosted on servers. The POP (post office protocol) and IMAP (internet messaging access protocol) are used to message the mails sent to a client on a server. The application is written with standards and protocols to ensure compatibility in all types of device form factor, so an email can be view in a laptops, smartphones etc.

4 0
3 years ago
Anyone here codes? <br> C++, C#, Lua? Anything?
Travka [436]

Answer:

IxxyzjgzkgzjgKfzkg v

jvljcljxkhxkgg/gjhkggzkykzkgjzjgggggzjgcufxu

Explanation:

nk yxthzefhGghghrhgzxhhsdgchiixxu

7 0
3 years ago
Read 2 more answers
Ethical design refers to...
Travka [436]

Answer:

C. A set of principles dictating that technology should do no harm and seek to improve the human condition

Explanation:

Anything "ethical" refers to being "right" or "just", for example, calling someone a racial slur would not be ethical, but learning a little bit about their culture to understand them better would be ethical

8 0
3 years ago
Other questions:
  • Which of the following has likely attended vocational school?
    10·1 answer
  • If a secret key is to be used as a _________ for conventional encryption a single number must be generated.
    13·1 answer
  • How to do this PLEASE HELP 80 points!
    15·1 answer
  • How should the teachers respond to the parental complaints of student C? If they fail the student, the student will likely be re
    11·1 answer
  • What causes the natural event called El Niño? In a short paragraph, describe El Niño and the effects it has on Latin America.
    9·1 answer
  • A green screen should be lit with which two lights?
    6·2 answers
  • Consider a file currently consisting of 100 blocks. Assume that the file control block (and the index block, in the case of inde
    12·1 answer
  • Write a program to take in a time-of-day on the command-line as 3 integers representing hours, minutes, and seconds, along with
    13·1 answer
  • In Python in order for a sort to work, which of the following is required?
    14·2 answers
  • Who still plays old Nintendo 64 games?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!