Difference between revisions of "Denial of Service"
(→Philippines) |
|||
Line 32: | Line 32: | ||
{{definition|''Distributed'' Denial of Service (DDoS) is een vorm van DoS waarbij een bepaalde dienst (bijvoorbeeld een website) niet beschikbaar wordt gemaakt door deze te bestoken met veel netwerkverkeer vanuit een groot aantal verschillende bronnen. <ref name=csbn>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/cybersecuritybeeld-nederland/cybersecuritybeeld-nederland-2018/1/CSBN_2018.pdf Cyber Security Beeld Nederland 2018]</ref>}}<br/><br/> | {{definition|''Distributed'' Denial of Service (DDoS) is een vorm van DoS waarbij een bepaalde dienst (bijvoorbeeld een website) niet beschikbaar wordt gemaakt door deze te bestoken met veel netwerkverkeer vanuit een groot aantal verschillende bronnen. <ref name=csbn>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/cybersecuritybeeld-nederland/cybersecuritybeeld-nederland-2018/1/CSBN_2018.pdf Cyber Security Beeld Nederland 2018]</ref>}}<br/><br/> | ||
==== [[Philippines]] ==== | ==== [[Philippines]] ==== | ||
− | {{definition|Denial of Service (DOS): Interruption in an authorised user's access to a computer network, typically with malicious intent. A DOS attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet or the organisation’s Intranet. <ref>[https://digital.nhs.uk/services/data-and-cyber-security-protecting-information-and-data-in-health-and-care/cyber-and-data-security-policy-and-good-practice-in-health-and-care/cyber-and-data-security-resources/cyber-security-glossary NHS Cyber security glossary]</ref>}}<br/><br/> | + | {{definition|Denial of Service (DOS): Interruption in an authorised user's access to a computer network, typically with malicious intent. A DOS attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet or the organisation’s Intranet. <ref>[https://digital.nhs.uk/services/data-and-cyber-security-protecting-information-and-data-in-health-and-care/cyber-and-data-security-policy-and-good-practice-in-health-and-care/cyber-and-data-security-resources/cyber-security-glossary NHS Cyber security glossary]</ref>}}<br/> |
− | + | {{definition|Distributed Denial of Service (DDOS): Denial of Service attacks are launched from multiple connected devices that are distributed across the Internet or the organisation’s Intranet. <ref>[https://digital.nhs.uk/services/data-and-cyber-security-protecting-information-and-data-in-health-and-care/cyber-and-data-security-policy-and-good-practice-in-health-and-care/cyber-and-data-security-resources/cyber-security-glossary NHS Cyber security glossary]</ref>}}<br/><br/> | |
==== [[Senegal]] ==== | ==== [[Senegal]] ==== |
Revision as of 23:13, 26 March 2019
Contents
Definitions
National Definitions
Australia
These attacks often flood targeted systems with requests until they are unable to respond.
Burkina-Faso
La méthode la plus classique consiste à faire crouler le serveur sous une masse de requêtes généralement mal formées pour entraîner une réponse anormale et paralysante. Une attaque distribuée venant de plusieurs sources est appelée DDoS.
Examples of a remote DoS are SYS-a. PING-flooding or E-mail bombing (DDoS: TFN, Trinity, etc.) However, the availability also can be affected by local actions (destruction, disruption of power supply, etc.).
France
Hong Kong
Denial-of-Service: An attacker attempts to prevent legitimate users from accessing information or services. Examples of such attacks are SYN flood, Ping O death, packet flooding and Ping flooding. [6]
Distributed Denial of Service (DDoS): An attack using multiple computers to launch denial-of-service (DoS) attacks at the same time against a targeted system. [7]
Jamaica
Kuwait
Liberia
Netherlands
Philippines
Senegal
Tunisia
The most common method is to cram the server under a mass of queries usually poorly formed to cause an abnormal response and paralyzing. A distributed attack from multiple sources is called DDoS.
United Kingdom
United States
DHS
NIST
See also
Notes
- ↑ Protective Security Policy Framework - Glossary Oct 2017
- ↑ on-line glossary Stay Safe On-line
- ↑ CIRT-BF Glossary
- ↑ CIRT-BF Glossary
- ↑ Revue stratégique de cyberdéfense 12 février 2018
- ↑ Information Security Glossary
- ↑ Information Security Glossary
- ↑ Jamaica's National Cyber Security Strategy
- ↑ Glossary Communication and Information Technology Regulatory
- ↑ Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors
- ↑ 11.0 11.1 Cyber Security Beeld Nederland 2018
- ↑ NHS Cyber security glossary
- ↑ NHS Cyber security glossary
- ↑ STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)
- ↑ ANSI Glossary
- ↑ Secure by Design: Improving the cyber security of consumer Internet of Things Report (2018)
- ↑ 17.0 17.1 DHS/NICSS Glossary
- ↑ 18.0 18.1 18.2 NIST Glossary