Difference between revisions of "Denial of Service"
(→Sri Lanka) |
(→Notes) |
||
Line 71: | Line 71: | ||
[[Category:Protection]][[Category:Resilience]][[Category:Civil Protection]] | [[Category:Protection]][[Category:Resilience]][[Category:Civil Protection]] | ||
− | {{#set:defined by=Australia|defined by=Burkina-Faso|defined by=France|defined by=Hong Kong|defined by=Jamaica|defined by=Kuwait|defined by=Liberia|defined by=Netherlands|defined by= Philippines|defined by=Senegal|defined by=Tunisia|defined by=United Kingdom|defined by=United States|defined by=DHS|defined by=NIST}} | + | {{#set:defined by=Australia|defined by=Burkina-Faso|defined by=France|defined by=Hong Kong|defined by=Jamaica|defined by=Kuwait|defined by=Liberia|defined by=Netherlands|defined by= Philippines|defined by=Senegal|defined by=Sri Lanka|defined by=Tunisia|defined by=United Kingdom|defined by=United States|defined by=DHS|defined by=NIST}} |
Revision as of 01:59, 27 March 2019
Contents
Definitions
National Definitions
Australia
These attacks often flood targeted systems with requests until they are unable to respond.
Burkina-Faso
La méthode la plus classique consiste à faire crouler le serveur sous une masse de requêtes généralement mal formées pour entraîner une réponse anormale et paralysante. Une attaque distribuée venant de plusieurs sources est appelée DDoS.
Examples of a remote DoS are SYS-a. PING-flooding or E-mail bombing (DDoS: TFN, Trinity, etc.) However, the availability also can be affected by local actions (destruction, disruption of power supply, etc.).
France
Hong Kong
Denial-of-Service: An attacker attempts to prevent legitimate users from accessing information or services. Examples of such attacks are SYN flood, Ping O death, packet flooding and Ping flooding. [6]
Distributed Denial of Service (DDoS): An attack using multiple computers to launch denial-of-service (DoS) attacks at the same time against a targeted system. [7]
Jamaica
Kuwait
Liberia
Netherlands
Philippines
Senegal
Sri Lanka
Tunisia
The most common method is to cram the server under a mass of queries usually poorly formed to cause an abnormal response and paralyzing. A distributed attack from multiple sources is called DDoS.
United Kingdom
United States
DHS
NIST
See also
Notes
- ↑ Protective Security Policy Framework - Glossary Oct 2017
- ↑ on-line glossary Stay Safe On-line
- ↑ CIRT-BF Glossary
- ↑ CIRT-BF Glossary
- ↑ Revue stratégique de cyberdéfense 12 février 2018
- ↑ Information Security Glossary
- ↑ Information Security Glossary
- ↑ Jamaica's National Cyber Security Strategy
- ↑ Glossary Communication and Information Technology Regulatory
- ↑ Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors
- ↑ 11.0 11.1 Cyber Security Beeld Nederland 2018
- ↑ NHS Cyber security glossary
- ↑ NHS Cyber security glossary
- ↑ STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)
- ↑ National Centre for Cyber Security, Information Security Policy Domains #19: Glossary
- ↑ ANSI Glossary
- ↑ Secure by Design: Improving the cyber security of consumer Internet of Things Report (2018)
- ↑ 18.0 18.1 DHS/NICSS Glossary
- ↑ 19.0 19.1 19.2 NIST Glossary