1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skad [1K]
3 years ago
9

What makes a distributed denial of service attack "distributed"? It involves many ip addresses. It attacks multiple systems. It

involves technological and physical systems to launch the attack. It involves multiple systems to launch the attack?
Computers and Technology
1 answer:
makvit [3.9K]3 years ago
8 0

Solution:

A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. The flood of incoming messages, connection requests or malformed packets to the target system forces it to slow down or even crash and shut down, thereby denying service to legitimate users or systems.

DDoS attacks have been carried out by diverse threat actors, ranging from individual criminal hackers to organized crime rings and government agencies. In certain situations, often ones related to poor coding, missing patches or generally unstable systems, even legitimate requests to target systems can result in DDoS-like results.

It works as:

In a typical DDoS attack, the assailant begins by exploiting a vulnerability in one computer system and making it the DDoS master. The attack master system identifies other vulnerable systems and gains control over them by either infecting the systems with malware or through bypassing the authentication controls (i.e., guessing the default password on a widely used system or device).

A computer or networked device under the control of an intruder is known as a zombie, or bot. The attacker creates what is called a command-and-control server to command the network of bots, also called a botnet. The person in control of a botnet is sometimes referred to as the bot master.

Botnets can be comprised of almost any number of bots; botnets with tens or hundreds of thousands of nodes have become increasingly common, and there may not be an upper limit to their size. Once the botnet is assembled, the attacker can use the traffic generated by the compromised devices to flood the target domain and knock it offline.


You might be interested in
Who is the father of computer ethics?​
IRINA_888 [86]

Answer:

<h3>Donn Parker Of SRI is the father of computer ethics.</h3>

Explanation:

Donn Parker of SRI, who is credited with being the "father of computer ethics" due to his interest during the 1960's with ethical concerns related to the newly emerging information technologies, defines computer ethics as the application of classical ethical prin- ciples to the use of computer technology 

3 0
3 years ago
Which tab of the ribbon includes the links group for creating hyperlinks or internal references?
Deffense [45]
The correct answer is D.File
5 0
3 years ago
Read 2 more answers
What is the difference between Windows 7 and Windows 10?
Novay_Z [31]
If you have windows 7 and then change to windows 10, you will see a lot of differences like Microsoft account integration, a new start menu, new apps and a windows store, Cortana and a task view bar, you get edge in windows 10, and most important desktop and security improvements
 Hope this helps!
6 0
3 years ago
A business has recently deployed laptops to all sales employees. The laptops will be used primarily from home offices and while
lys-0071 [83]

C. OS hardening.

Making an operating system more secure. It often requires numerous actions such as configuring system and network components properly, deleting unused files and applying the latest patches.

The purpose of system hardening is to eliminate as many security risks as possible. This is typically done by removing all non-essential software programs and utilities from the computer.

5 0
3 years ago
The ________ coordinates the flow of data and information through the computer system by coordinating the hardware, software, us
Irina-Kira [14]

Answer:

Operating System.

Explanation:

All the properties listed in the question are handled by the Operating system.

Operating system:-It is a software that manages the computer hardware,provides common services for the programs of the computer and software resources.

Some of the most popular operating systems are as following:-

  1. Microsoft Windows.
  2. Apple MACOS
  3. Linux.

There are also other operating systems present out there these are some of the mostly used OS's.

8 0
3 years ago
Other questions:
  • _____ is a valuable tool that enables you to find information on the web by specifying words or phrases know as keywords- which
    14·1 answer
  • What's a good show to watch on Netflix?
    7·1 answer
  • What is the energy conversion of solar water heaters?
    12·1 answer
  • How can you be more efficient on the internet? No more than two sentences (Cause i need to do the problem by myself mostly) Than
    7·2 answers
  • Plz hurry it’s timed
    5·1 answer
  • Which of the following is the BEST reason to use cash for making purchases? everfi
    15·1 answer
  • OI MINHA PRIMEIRA VEZ AQUI
    7·1 answer
  • How does toothbrushes affect the world of technology?
    11·2 answers
  • Dynamics simulate stillness via calculations performed by the computer.
    13·2 answers
  • // This pseudocode is intended to describe
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!