Explain a distributed denial of service attack


A distributed denial of service (DDoS) attack may take the form of a SYN flood or smurf attack. The distinguishing feature of the DDoS is the sheer scope of the event. The perpetrator of a DDoS attack may employ a virtual army of so-called zombie or bot (robot) computers to launch the attack. Since vast numbers of unsuspecting intermediaries are needed, the attack often involves one or more Internet Relay Chat (IRC) networks as a source of zombies. The perpetrator accesses the IRC and uploads a malicious program such as a Trojan horse, which contains DDoS attack script. This program is subsequently downloaded to the PCs of the many thousands of people who visit the IRC site. The attack program runs in the background on the new zombie computers, which are now under the control of the perpetrator. Via the zombie control program the perpetrator can direct the DDoS to specific victims and turn on or off the attack at will.

Business

You might also like to view...

In 2015, the Rachel Company initiated a defined benefit pension plan. It recorded $240,000 as pension expense and paid $280,000 to a funding agency. As a result, Rachel will report

A) pension assets of $280,000 and pension liabilities of $240,000. B) an accrued liability of $50,000. C) service cost of $280,000 and unfunded prior service cost of $40,000. D) prepaid pension cost of $40,000.

Business

A retailer's primary competitors are other retailers that

A. use the same type of store format. B. sell online. C. scramble merchandise. D. are more vertically integrated. E. have the same target market.

Business

If a company uses a factory overhead ledger, at the end of the month, an accountant should:

a. close the accounts in the factory overhead ledger to Work in Process. b. total the accounts in the factory overhead ledger and compare the total to the balance in the Factory Overhead control account. c. prepare a schedule of fixed costs. d. All of the above are true.

Business

In an ethical decision-making workshop, what activity should a facilitator introduce after introducing the hypothetical ethical dilemma?

a. Have participants vote by secret ballot on the best solution, then tally the votes and share the results with the workshop. b. Have participants break out into small groups and discuss possible solutions. c. Have participants write down a single sentence describing what they think to be the best possible course of action. d. Have participants write answers to the seven systematic rational ethical decision- making process questions.

Business