1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
10

What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more

dangerous and devastating? why?
Computers and Technology
1 answer:
KIM [24]3 years ago
6 0
A denial-of-service (or DoS) attack is where one single computer continuously sends information to a particular IP address in an attempt to overload the network, and take it down. It is called denial-of-service, because you are literally preventing other legitimate users from accessing the server. DoS attacks are not as commonly done professionally today, due to modern technological advances where these servers are able to cope with lots of junk packets from one user, and will often times just block their IP address if the packets are sent too frequently.

A distributed denial-of-service attack is where an IP address is overloaded from multiple users at the same time, often general users like you and I. The way this is accomplished is through botnets, which are simple non-malicious programs that are retrieved through downloading things on the internet, often things like torrents, and they are hard to remove due to them being non malicious. A botnet simply routes internet traffic from the user's computer to the victim's IP address, and due to the nature of a botnet being able to spread to multiple computers very quickly via the internet, DDoS'ing is a much more potentially devastating attack, and loads of junk packets coming from tons of different users compared to one user in a DoS attack is much more likely to take down a server or a network. Additionally, the victim server is unable to distinguish the difference between an attacker and a legitimate user, as the packets are not sent too frequently from each user as to not get IP blocked, but the attack rather relies on the fact that there could sometimes be hundreds of thousands of users all at once, attacking a single IP address.
You might be interested in
Quick!!! Brainliest
xxTIMURxx [149]
D. A technology-and creativity-driven world
7 0
3 years ago
Write a program for TIC TAC TOE in PYTHON
masya89 [10]

Answer: much too long to write here: see attached

Explanation:

3 0
3 years ago
Each time an end user clicks a hyperlink, the browser generates a(n) _____ page request that is sent to the designated web serve
igomit [66]

Answer: HTTP GET

Explanation: There are many  HTTP(Hypertext Transfer protocol) requests sent to the server from the client .The page that gets request while the hyperlink page is clicked by the client, opens a HTTP GET page that belongs to the Internet protocol's(IP)suite by server. It is a process for the revival of the data from a particular server. The data does not get effected during the process of the retrieval.

3 0
3 years ago
In the information systems (IS) department, the ________ group manages the process of creating new information systems as well a
Elodia [21]

Answer:Operations

Explanation:Information system is the system that provides the knowledge about the technology and other related component working with the people.It has the function that help in the information and the communication technology.It has several function like analysis of the data, keeping record , processing etc.

The technique through which the data of the information system is managed and processed is considered in the category of the operations.Operation task manages the information that is previously stored as well as the current information.

5 0
3 years ago
I need some help with this!
aivan3 [116]

Answer:1. Code Blocks

2. Pop.

3. Role-playing Games.

4. Storytelling

5. The sprite would draw a line to a random position, then create another line 100 units long.

6. Objective.

7. True

8. Obstacles.

9. Jumping over Bowser in a Mario game  motion-capture devices (e.g., Kinect, WiiMote)

10.  A balance of good and bad emotions.

11. Rescuing Princess Peach from Bowser  playing an ocarina to teleport across the land.

12. Designer

13. Count-controlled loop

14. True

15. Conditional Block.

16. The Landlord's Game.

17. Algorithm

18. Run/test window

19. Poker-type games.

20. Illustrations

21. Stop pen

22. Control

23. False

24. Role-playing game.

25. True.

26. Change y by -15

27. Scratch

28. The Olympics.

Explanation:

8 0
3 years ago
Other questions:
  • Why will the standard replacement algorithms (LRU, FIFO, clock) not be effective in handling this workload for a page allocation
    11·1 answer
  • What is a critique of the feature detector model of object recognition?​?
    8·1 answer
  • A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
    13·1 answer
  • A call center is a _______.<br><br> JIT<br><br> CMA<br><br> CIC<br><br> SFA
    8·1 answer
  • What is qwerty and why is it on the keyboard?
    15·2 answers
  • Ben pays his mobile bills, watches movies, and shops online using the Internet. Which internet activity does he perform?
    13·2 answers
  • Recall that the name of a transport-layer packet is segment and that the name of a link-layer packet is frame. What is the name
    12·1 answer
  • When working on developing an ability, it is important to get feedback to know how you are doing.
    6·1 answer
  • Find the root using bisection method with initials 1 and 2 for function 0.005(e^(2x))cos(x) in matlab and error 1e-10?
    8·1 answer
  • What are the data type(s) will be used to declare the variable(s) needed to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!