Difference between revisions of "Denial of Service"
(→Senegal) |
(→Sri Lanka) |
||
Line 38: | Line 38: | ||
{{definition|Dénis de services distribués (« DDoS »: un type d’attaque rendant un service inaccessible aux bénéficiaires habituels du service. Il s’agit d’ne technique perturbant fortement le fonctionnement normal du système par un grand nombre de requêtes. <ref>[http://www.numerique.gouv.sn/sites/default/files/SNC2022-vf.pdf STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)]</ref>}}<br/><br/> | {{definition|Dénis de services distribués (« DDoS »: un type d’attaque rendant un service inaccessible aux bénéficiaires habituels du service. Il s’agit d’ne technique perturbant fortement le fonctionnement normal du système par un grand nombre de requêtes. <ref>[http://www.numerique.gouv.sn/sites/default/files/SNC2022-vf.pdf STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)]</ref>}}<br/><br/> | ||
==== [[Sri Lanka]]==== | ==== [[Sri Lanka]]==== | ||
− | {{definition|Denial of Service (DoS) / Distributed DoS (DDoS): Where an attacker attempts to prevent legitimate users from accessing information or services online. The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. In a distributed DoS attack, an attacker takes unauthorised control of multiple computers, which may be harnessed as a botnet, to launch a DoS attack. | + | {{definition|Denial of Service (DoS) / Distributed DoS (DDoS): Where an attacker attempts to prevent legitimate users from accessing information or services online. The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. In a distributed DoS attack, an attacker takes unauthorised control of multiple computers, which may be harnessed as a botnet, to launch a DoS attack. <ref>[http://www.slcert.gov.lk/Downloads/Policies/19.doc National Centre for Cyber Security, Information Security Policy Domains #19: Glossary]</ref> }}<br/><br/> |
− | |||
==== [[Tunisia]] ==== | ==== [[Tunisia]] ==== |
Revision as of 01:59, 27 March 2019
Contents
Definitions
National Definitions
Australia
These attacks often flood targeted systems with requests until they are unable to respond.
Burkina-Faso
La méthode la plus classique consiste à faire crouler le serveur sous une masse de requêtes généralement mal formées pour entraîner une réponse anormale et paralysante. Une attaque distribuée venant de plusieurs sources est appelée DDoS.
Examples of a remote DoS are SYS-a. PING-flooding or E-mail bombing (DDoS: TFN, Trinity, etc.) However, the availability also can be affected by local actions (destruction, disruption of power supply, etc.).
France
Hong Kong
Denial-of-Service: An attacker attempts to prevent legitimate users from accessing information or services. Examples of such attacks are SYN flood, Ping O death, packet flooding and Ping flooding. [6]
Distributed Denial of Service (DDoS): An attack using multiple computers to launch denial-of-service (DoS) attacks at the same time against a targeted system. [7]
Jamaica
Kuwait
Liberia
Netherlands
Philippines
Senegal
Sri Lanka
Tunisia
The most common method is to cram the server under a mass of queries usually poorly formed to cause an abnormal response and paralyzing. A distributed attack from multiple sources is called DDoS.
United Kingdom
United States
DHS
NIST
See also
Notes
- ↑ Protective Security Policy Framework - Glossary Oct 2017
- ↑ on-line glossary Stay Safe On-line
- ↑ CIRT-BF Glossary
- ↑ CIRT-BF Glossary
- ↑ Revue stratégique de cyberdéfense 12 février 2018
- ↑ Information Security Glossary
- ↑ Information Security Glossary
- ↑ Jamaica's National Cyber Security Strategy
- ↑ Glossary Communication and Information Technology Regulatory
- ↑ Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors
- ↑ 11.0 11.1 Cyber Security Beeld Nederland 2018
- ↑ NHS Cyber security glossary
- ↑ NHS Cyber security glossary
- ↑ STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)
- ↑ National Centre for Cyber Security, Information Security Policy Domains #19: Glossary
- ↑ ANSI Glossary
- ↑ Secure by Design: Improving the cyber security of consumer Internet of Things Report (2018)
- ↑ 18.0 18.1 DHS/NICSS Glossary
- ↑ 19.0 19.1 19.2 NIST Glossary