Topics: Computer security, Computer, Computer program Pages: 2 (754 words) Published: October 28, 2014

DDoSDDoS means Distributed Denial of Service and what that means is that it spams a target with so many request to the point that the target is really slow and inoperable or crashes. DDoS works by a cracker sending the command to initiate the attack to his zombie army. Each computer within the army sends an electronic connection request to an innocent computer called a reflector. When the reflector receives the request, it looks like it originates not from the zombies, but from the ultimate victim of the attack. The reflectors send information to the victim system, and eventually the system's performance suffers or it shuts down completely as it is inundated with multiple unsolicited responses from several computers at once. From the perspective of the victim, it looks like the reflectors attacked the system. From the perspective of the reflectors, it seems like the victimized system requested the packets. The zombie computers remain hidden, and even more out of sight is the cracker himself.

DDoSDistributed Denial of Service Attack (DDoS) is A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet. In this article the DDos attack tried to prevent people from making an unofficial vote on who Hong Kong wanted as a preferred political representative. Cloudflare helped prevent the attack by tipping the traffic into sinkholes (DNS sinkhole) the DNS kept sending the data to a dead end so the attack could never hit cloudflare or Phishing

Phishing is a technique used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses. Virus
A segment of self-replicating code planted illegally in a computer program, often to damage or shutdown a system or network. Worm
A program or algorithm that replicates...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay about Cybersecurity
  • essay cybersecurity
  • Cybersecurity Policy Essay
  • Emerging Cybersecurity Technologies and Essay
  • Technology and the Impact on Cybersecurity Essay
  • Cybersecurity Resolution Essay
  • Cybersecurity Tutorial Essay
  • Current cybersecurity policy issues for the protection of the Internet infrastructure Essay

Become a StudyMode Member

Sign Up - It's Free