Difference between revisions of "Denial of Service"
(→Netherlands) |
|||
Line 34: | Line 34: | ||
{{definition|Denial of Service is de benaming voor een type aanval die een bepaalde dienst (bijvoorbeeld een website) niet beschikbaar maakt voor de gebruikelijke afnemers. Bij websites wordt meestal een DDoS-aanval uitgevoerd. <ref name=csbn>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/cybersecuritybeeld-nederland/cybersecuritybeeld-nederland-2018/1/CSBN_2018.pdf Cyber Security Beeld Nederland 2018]</ref>}}<br/> | {{definition|Denial of Service is de benaming voor een type aanval die een bepaalde dienst (bijvoorbeeld een website) niet beschikbaar maakt voor de gebruikelijke afnemers. Bij websites wordt meestal een DDoS-aanval uitgevoerd. <ref name=csbn>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/cybersecuritybeeld-nederland/cybersecuritybeeld-nederland-2018/1/CSBN_2018.pdf Cyber Security Beeld Nederland 2018]</ref>}}<br/> | ||
{{definition|''Distributed'' Denial of Service (DDoS) is een vorm van DoS waarbij een bepaalde dienst (bijvoorbeeld een website) niet beschikbaar wordt gemaakt door deze te bestoken met veel netwerkverkeer vanuit een groot aantal verschillende bronnen. <ref name=csbn>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/cybersecuritybeeld-nederland/cybersecuritybeeld-nederland-2018/1/CSBN_2018.pdf Cyber Security Beeld Nederland 2018]</ref>}}<br/><br/> | {{definition|''Distributed'' Denial of Service (DDoS) is een vorm van DoS waarbij een bepaalde dienst (bijvoorbeeld een website) niet beschikbaar wordt gemaakt door deze te bestoken met veel netwerkverkeer vanuit een groot aantal verschillende bronnen. <ref name=csbn>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/cybersecuritybeeld-nederland/cybersecuritybeeld-nederland-2018/1/CSBN_2018.pdf Cyber Security Beeld Nederland 2018]</ref>}}<br/><br/> | ||
+ | ==== [[New Zealand]] ==== | ||
+ | {{definition|Distributed Denial of Service Attack (DDoS): A cyber attack that stops users from accessing a service or resource, by overloading that service with requests. <ref>[https://dpmc.govt.nz/sites/default/files/2019-07/Cyber%20Security%20Strategy.pdf New Zealand’s Cyber Security Strategy (2019)]</ref>}}<br/><br/> | ||
+ | |||
==== [[Philippines]] ==== | ==== [[Philippines]] ==== | ||
{{definition|Denial of Service (DOS): Interruption in an authorised user's access to a computer network, typically with malicious intent. A DOS attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet or the organisation’s Intranet. <ref>[https://digital.nhs.uk/services/data-and-cyber-security-protecting-information-and-data-in-health-and-care/cyber-and-data-security-policy-and-good-practice-in-health-and-care/cyber-and-data-security-resources/cyber-security-glossary NHS Cyber security glossary]</ref>}}<br/> | {{definition|Denial of Service (DOS): Interruption in an authorised user's access to a computer network, typically with malicious intent. A DOS attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet or the organisation’s Intranet. <ref>[https://digital.nhs.uk/services/data-and-cyber-security-protecting-information-and-data-in-health-and-care/cyber-and-data-security-policy-and-good-practice-in-health-and-care/cyber-and-data-security-resources/cyber-security-glossary NHS Cyber security glossary]</ref>}}<br/> |
Revision as of 00:33, 4 July 2019
Definitions
National Definitions
Australia
These attacks often flood targeted systems with requests until they are unable to respond.
Burkina-Faso
La méthode la plus classique consiste à faire crouler le serveur sous une masse de requêtes généralement mal formées pour entraîner une réponse anormale et paralysante. Une attaque distribuée venant de plusieurs sources est appelée DDoS.
Examples of a remote DoS are SYS-a. PING-flooding or E-mail bombing (DDoS: TFN, Trinity, etc.) However, the availability also can be affected by local actions (destruction, disruption of power supply, etc.).
France
Hong Kong
Denial-of-Service: An attacker attempts to prevent legitimate users from accessing information or services. Examples of such attacks are SYN flood, Ping O death, packet flooding and Ping flooding. [6]
Distributed Denial of Service (DDoS): An attack using multiple computers to launch denial-of-service (DoS) attacks at the same time against a targeted system. [7]
Jamaica
Kazachstan
DDoS - (от англ. Distributed Denial-of-Service) – распределенная атака типа отказ в обслуживании, которая являет собой одну из самых распространенных и опасных сетевых атак. В результате атаки нарушается или полностью блокируется обслуживание законных пользователей, сетей, систем и иных ресурсов.
DDoS - distributed denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users. A DoS attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. As clarification, distributed denial-of-service attacks are sent by two or more people, or bots, and denial-of-service attacks are sent by one person or system. [9]
Kuwait
Liberia
Netherlands
New Zealand
Philippines
Senegal
Singapore
Tunisia
The most common method is to cram the server under a mass of queries usually poorly formed to cause an abnormal response and paralyzing. A distributed attack from multiple sources is called DDoS.
United Kingdom
United States
DHS
NIST
See also
Notes
- ↑ Protective Security Policy Framework - Glossary Oct 2017
- ↑ on-line glossary Stay Safe On-line
- ↑ CIRT-BF Glossary
- ↑ CIRT-BF Glossary
- ↑ Revue stratégique de cyberdéfense 12 février 2018
- ↑ Information Security Glossary
- ↑ Information Security Glossary
- ↑ Jamaica's National Cyber Security Strategy
- ↑ CERT.Gov.KZ Glossary
- ↑ Glossary Communication and Information Technology Regulatory
- ↑ Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors
- ↑ 12.0 12.1 Cyber Security Beeld Nederland 2018
- ↑ New Zealand’s Cyber Security Strategy (2019)
- ↑ NHS Cyber security glossary
- ↑ NHS Cyber security glossary
- ↑ STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)
- ↑ [https://www.csa.gov.sg/~/media/csa/documents/publications/singaporecyberlandscape2017.pdf Singapore Cyber Landscape 2017]
- ↑ ANSI Glossary
- ↑ Secure by Design: Improving the cyber security of consumer Internet of Things Report (2018)
- ↑ 20.0 20.1 DHS/NICSS Glossary
- ↑ 21.0 21.1 21.2 NIST Glossary