1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RoseWind [281]
3 years ago
10

Explain how a Denial of Service (DoS) attack works. After describing a DoS conduct some research and provide an example of a rea

l company or website that was brought down by a DoS. What was the motive of the attackers).
Computers and Technology
1 answer:
Kay [80]3 years ago
3 0

Answer:                                                                                    

  • A Denial of Service(DoS) is a cyber attack in which the attacker makes a machine or network resource unavailable to its intended users by temporarily interrupting services of a host connected to the Internet.
  • It works by flooding the targeted system or resource with redundant requests or traffic to overload systems and prevent legitimate and valid requests from being accomplished.
  • Usually the user establishes a connection by sending a request to server to authenticate it and server responses back by giving authentication permission. This permission is acknowledged by the user and then is enabled on the server.
  • Contrary to this, in a DOS attach, users send multiple authentication requests to server and these requests contain wrong return addresses so server cant identify the user in order to send permission. The server waits for some time before attempting to close the connection but before it closes the connection the perpetrator sends new set of  false requests and this process starts again.
  • DOS attacks can slow network performance, makes a certain website unavailable and not accessible.
  • BBC was attacked with a DDoS attack measuring over 600 Gbps, The motive of the attackers who claimed responsibility, was that they were just “testing.”
  • The biggest DDoS attack happened to target GitHub. This politically motivated attack lasted several days and adapted itself around implemented DDoS mitigation strategies. The DDoS traffic initiated in China and it is suspected that the Chinese Government oversaw the attack.
  • Wikipedia was brought down by DDoS attack in Germany and some parts of Europe.  
  • TalkTalk a company which provides pay television, telecommunications, Internet access, and mobile network services to  costumers in the United Kingdom was brought down by DDoS attack   by a group of teenagers purely for their own entertainment.
  • In 2000 a 15-year-old hacker known as ‘Mafiaboy’ brought down several popular websites in the world including CNN,  eBay, and Yahoo, This attack had resulted chaos in stock market.  Attacker was revealed to be a high school student named Michael Calce, attacked by hacking into the networks of several universities and using their servers to perform DDoS attack. His motive was to intimidate other hacker groups.

You might be interested in
It is a SQL keyword that creates an autoincrementing field.
Serjik [45]

Answer:

c. AUTO_INCREMENT

Explanation:

this should help

6 0
2 years ago
What technique involves graphical methods and nontechnical language that represent the system at various stages of development a
Mnenie [13.5K]

Answer:

The answer to this question this "modeling".

Explanation:

In this question, the answer is modeling because in system design we use System Analysis and Design(SAD). It is the most important subject in any software design like a mobile application, website, web pages, etc. In this subject, there is an important topic that is SDLC. The term SDLC stands for systems development life cycle or it is also known as the software development life cycle. It is a conceptual modeling used in project management that describes the stages involves the information for system development project. It maintenance the complete application. SDLC applied to technical and non-technical systems. In the SDLC many phases can be given as:

Requirement gathering and analysis:

In this phase, all the relevant information is collected from the customer to develop a product as their expectation.

Design:

In the design phase, the requirement gather by the software requirements specification (SRS) in a document that is used for software architecture.

Implementation or coding:

After completing the design phase we implement/coding in that section like User input validation, admin work, payment management, etc.

Testing:

In this section, we test all the things in software before hand over to the customer.

Deployment:

In this section after completing the testing successfully. it goes to the deployment section in this section production environment or User Acceptance testing is done depending on the customer expectation.

Maintenance:

In the maintenance section when the product is hand over customer and in future if any issue comes up and needs to be fixed or there is any Up-gradation is needed So it is done by the developers.

In computer science, any development is done on modules. So the answer to this question is modeling.

3 0
3 years ago
What does www stand for?
Temka [501]
Www stands for world wide web
3 0
3 years ago
Read 2 more answers
The equation of certain traveling waves is y(x.t) = 0.0450 sin(25.12x - 37.68t-0.523) where x and y are in
NNADVOKAT [17]

Answer:

A. 0.0450

B. 4

C. 0.25

D. 37.68

E. 6Hz

F. -0.523

G. 1.5m/s

H. vy = ∂y/∂t = 0.045(-37.68) cos (25.12x - 37.68t - 0.523)

I. -1.67m/s.

Explanation:

Given the equation:

y(x,t) = 0.0450 sin(25.12x - 37.68t-0.523)

Standard wave equation:

y(x, t)=Asin(kx−ωt+ϕ)

a.) Amplitude = 0.0450

b.) Wave number = 1/ λ

λ=2π/k

From the equation k = 25.12

Wavelength(λ ) = 2π/25.12 = 0.25

Wave number (1/0.25) = 4

c.) Wavelength(λ ) = 2π/25.12 = 0.25

d.) Angular frequency(ω)

ωt = 37.68t

ω = 37.68

E.) Frequency (f)

ω = 2πf

f = ω/2π

f = 37.68/6.28

f = 6Hz

f.) Phase angle(ϕ) = -0.523

g.) Wave propagation speed :

ω/k=37.68/25.12=1.5m/s

h.) vy = ∂y/∂t = 0.045(-37.68) cos (25.12x - 37.68t - 0.523)

(i) vy(3.5m, 21s) = 0.045(-37.68) cos (25.12*3.5-37.68*21-0.523) = -1.67m/s.

5 0
3 years ago
The website of an international human rights organization stores a large database of information and provides search functionali
ValentinkaMS [17]

Answer:

False.

Explanation:

The website of an international human rights organization stores a large database of information and provides search functionality to make it easier for their visitors to locate desired information. However, this approach fails to be effective since the search functionality is limited to the website rather than the whole web is a False statement.

3 0
3 years ago
Other questions:
  • If you quote an author from a website in a paper, it will be important to create a _____ in your writing to give them credit for
    7·2 answers
  • Which type of wireless network is<br> controlled through a wireless<br> access point?
    7·1 answer
  • Properly defined the primary part of a CPU​
    5·1 answer
  • "The fact that we could create and manipulate an Account object without knowing its implementation details is called"
    9·1 answer
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    6·1 answer
  • What characters cannot be used in a filename?
    15·1 answer
  • Data types influence the following in the workflow: (Select all that apply)a. the color choices and layout decisions around comp
    15·2 answers
  • Which of the following is a web app?
    5·1 answer
  • What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible
    11·1 answer
  • What does a coder do on a daily basis?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!