Difference between revisions of "Denial of Service"
Jump to navigation
Jump to search
(→Notes) |
|||
Line 5: | Line 5: | ||
=== National Definitions === | === National Definitions === | ||
+ | ==== [[Liberia]] ==== | ||
+ | {{definition|Denial-of-service ''attack'': Flooding the networks or servers of individuals or organizations with false data requests so they are unable to respond to requests from legitimate users. <ref>[http://www.lta.gov.lr/doc/ICT%20_%20Telecom%20Policy%20Main%20Body.pdf Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors]</ref>}}<br /><br /> | ||
====[[United States]]==== | ====[[United States]]==== | ||
=====[[DHS]]===== | =====[[DHS]]===== | ||
Line 31: | Line 33: | ||
[[Category:Protection]][[Category:Resilience]][[Category:Civil Protection]] | [[Category:Protection]][[Category:Resilience]][[Category:Civil Protection]] | ||
− | {{#set:defined by=United States|defined by=DHS|defined by=NIST}} | + | {{#set:defined by=Liberia|defined by=United States|defined by=DHS|defined by=NIST}} |
Revision as of 01:01, 2 February 2018
Contents
Definitions
National Definitions
Liberia
Denial-of-service attack: Flooding the networks or servers of individuals or organizations with false data requests so they are unable to respond to requests from legitimate users. [1]
United States
DHS
Denial of Service is an attack that prevents or impairs the authorized use of information system resources or services. [2]
Distributed denial of service is a Denial of Service technique that uses numerous systems to perform the attack simultaneously. [2]
NIST
Denial of Service: Actions that prevent the system from functioning in accordance with its intended purpose (from: NIST SP 800-24) [3]
Denial of Service: The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided) (from: NIST SP 800-27 Rev A) [3]
Denial of Service: The prevention of authorized access to resources or the delaying of time-critical operations. (from: NIST SP 800-33) [3]