Briefly describe the following types of attacks: DoS, man-in-the-middle, and IP service.

What will be an ideal response?


In a DoS attack, a service is inundated with service requests, or malformed service requests cause a server to hang. In either case, legitimate users are denied access to a server's services because it is kept completely busy or becomes unavailable.
In a man-in-the-middle (MITM) attack, the attacker is able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side.
Numerous IP services are subject to attack (IP service attacks), often through their well-known ports (but sometimes through other ports as well) in ways that can expose the underlying systems to inspection or manipulation, particularly when the underlying file system is accessible.

Computer Science & Information Technology

You might also like to view...

Case EX 7-2Ron wants to be able to distinguish one worksheet from another.  He plans to rename the worksheets and change the color of the tabs.Ron now wants to change the tab color.  He first right-clicks the sheet tab he wants to recolor, points to ____ on the shortcut menu, and then clicks the color he wants for the tab.

A. Tab B. Color C. Tab Color D. New Color

Computer Science & Information Technology

The practice used by the British government to order searches that was so widely despised by our forefathers was called __________________

a. Writ of Assistance b. General Warrant c. Forfeiture of Domain d. Access Demand

Computer Science & Information Technology

_______ is one of the most powerful and useful forms of scientific visualization.

A. Image enhancement B. Image manipulation C. Image animation D. Image virtualization

Computer Science & Information Technology

?Which of the following is the default overflow property?

A. ?visible B. ?hidden C. ?scroll D. ?auto

Computer Science & Information Technology