1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
10

What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more

dangerous and devastating? why?
Computers and Technology
1 answer:
KIM [24]3 years ago
6 0
A denial-of-service (or DoS) attack is where one single computer continuously sends information to a particular IP address in an attempt to overload the network, and take it down. It is called denial-of-service, because you are literally preventing other legitimate users from accessing the server. DoS attacks are not as commonly done professionally today, due to modern technological advances where these servers are able to cope with lots of junk packets from one user, and will often times just block their IP address if the packets are sent too frequently.

A distributed denial-of-service attack is where an IP address is overloaded from multiple users at the same time, often general users like you and I. The way this is accomplished is through botnets, which are simple non-malicious programs that are retrieved through downloading things on the internet, often things like torrents, and they are hard to remove due to them being non malicious. A botnet simply routes internet traffic from the user's computer to the victim's IP address, and due to the nature of a botnet being able to spread to multiple computers very quickly via the internet, DDoS'ing is a much more potentially devastating attack, and loads of junk packets coming from tons of different users compared to one user in a DoS attack is much more likely to take down a server or a network. Additionally, the victim server is unable to distinguish the difference between an attacker and a legitimate user, as the packets are not sent too frequently from each user as to not get IP blocked, but the attack rather relies on the fact that there could sometimes be hundreds of thousands of users all at once, attacking a single IP address.
You might be interested in
Susan is creating a spreadsheet, and she needs to enter the months of the year in column A. Susan should _____.
AysviL [449]
Enter January in A1 hold mouse in bottom right hand corner of cell. Hold mouse button down and drag the mouse. Excel will populate the months of the year
3 0
3 years ago
Read 2 more answers
The windows desktop contains a start button in its lower-right corner, which can be used to start the computer.
WITCHER [35]
If you are referring to the actual desktop interface inside windows, it goes down to what version you would have. But to my knowledge, there is no start button in the lower right corner. 
6 0
4 years ago
For an activity with more than one immediate predecessor activity, which of the following is used to compute its earliest finish
laila [671]

Answer:

The correct option is A

Explanation:

In project management, earliest finish time for activity A refers to the earliest start time for succeeding activities such as B and C to start.

Assume that activities A and B comes before C, the earliest finish time for C can be arrived at by computing the earliest start-finish (critical path) of the activity with the largest EF.

That is, if two activities (A and B) come before activity C, one can estimate how long it's going to take to complete activity C if ones knows how long activity B will take (being the activity with the largest earliest finish time).

Cheers!

7 0
3 years ago
What does tiny ink link do?????
patriot [66]

Answer:

what is it

Explanation:

'tiny ink link'

8 0
3 years ago
Read 2 more answers
How to plot probability density function on desmos
sertanlavr [38]

Answer:

Explanation:

6 0
3 years ago
Other questions:
  • Which hardware device should he consider upgrading in order to increase the system's storage space?
    6·1 answer
  • "a​ _______ network delivers user data in many different geographical locations and makes those data available in a way that min
    5·1 answer
  • Assume that c is a char variable has been declared and already given a value. write an expression whose value is true if and onl
    6·1 answer
  • What is the output <br>this is a computer science question ​
    8·1 answer
  • What does DOS stand for?
    15·1 answer
  • How to use command prompt​
    14·1 answer
  • Daniel owns a construction company that builds homes. To help his customers visualize the types of homes he can build for them,
    6·1 answer
  • You do not need to remove the lead weights inside tires before recycling them. A) TrueB) False
    15·1 answer
  • What is the CPU Unit of a computer?
    8·2 answers
  • It displays the contents of the active cell. It allows you to enter and edit data, such as formulas.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!