1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
7

Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this fu

ture network, anti-spoofing and directed broadcast filters are widely deployed. Also, the security of PCs and workstations is much greater, making the creation of botnets difficult. Do the administrators of server systems still have to be concerned about, and take further countermeasures against, DoS attacks? If so, what types of attacks can still occur, and what measures can be taken to reduce their impact? Explain in detail with valid diagram and example.
Computers and Technology
1 answer:
Amiraneli [1.4K]3 years ago
7 0

Answer:

yes administrators have to be concerned

Explanation:

It is necessary for countermeasures to be taken against DoS attacks

The types of attacks that can still occur are:

If the network connection get to be overloaded,  there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd  we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.

To reduce the impact of this kind of attacks,

1. there should be enough or excess network bandwidth  and distributed servers should be replicated if there is a possibility that network could get to be overloaded.

2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.

3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters

4. Use strong antivirus on computer sytems that are used to connect to the internet

You might be interested in
When an interviewer asks “Tell me about yourself”, you should tell them about your childhood past.
Butoxors [25]

Answer: Nooo! Dont!

Explanation:That is a bad idea!

4 0
3 years ago
Read 2 more answers
What is the output?
Pepsi [2]

Answer:

The answer is false

Explanation:

The string isalpha() returns True if all the characters are letters and the string has at least one character.

7 0
3 years ago
What is the meaning of s used in 0 and 1 in computer .​
timofeeve [1]

Answer:

A switch, unless it's busted, can be either on or off, closed or open. A switch that is “on” or “closed” passes electrical signal through it, while a switch that is “off” or “open” blocks that signal. Computer Scientists represent an “on” switch with a 1 and an “off” switch with a 0.

Explanation:

hope this helps!!

6 0
3 years ago
What are the two negative impacts of computer technology to the society?​
Sunny_sXe [5.5K]

One negative is that people are getting very impatient. This is because people are getting used to things instantly coming up onto their screens. Another negative is that people are being manipulated more easily. Nowadays anyone can be an expert if they sound smart enough. Then they can spread their lies quickly to millions of people.

6 0
3 years ago
Security controls are measures taken to protect systems from attacks on the integrity, confidentiality, and availability of the
Delvig [45]

Answer:

The correct option is D: Administrative controls

Explanation:

Administrative controls are also known as work practice controls and involves changes in the procedure of work such as rules, schedules, policies, training etc, with the intention of cutting down to the barest minimum incidence, duration, and the graveness of exposure to situations or chemical that constitute a hazard. Drug screening test would be to ensure that the employee is fit to work and does not form a hazard and thus is an administrative control.

4 0
4 years ago
Other questions:
  • In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long dis
    14·1 answer
  • COMPUTER ORGANIZATION &amp; ARCHITECTURE I<br>please help need the correct answers to all
    6·1 answer
  • A web ______ is a computer that delivers requested webpages to your computer or mobile device.
    7·1 answer
  • PLEASE HELP ON TECHNOLOGY
    8·1 answer
  • Describe the difference between cellular, wi-fi and wired networks.
    8·1 answer
  • 4. Where do you find the command to create bibliography citations or a table of contents?
    14·2 answers
  • Which one is correct
    8·1 answer
  • Which flowchart symbol is called the process symbol and contains the steps or actions in the process being depicted?
    6·2 answers
  • Which two characteristics of the matter change?
    14·1 answer
  • 0 -10°
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!