From the course: CompTIA Security (SY0-701) Cert Prep: 2 Threats, Vulnerabilities, and Mitigations
Unlock the full course today
Join today to access over 23,200 courses taught by industry experts.
Denial-of-service attacks
From the course: CompTIA Security (SY0-701) Cert Prep: 2 Threats, Vulnerabilities, and Mitigations
Denial-of-service attacks
- [Instructor] By this point you should know that the CIA triad describes the three goals of information security. Confidentiality, integrity, and availability. Most of the attack techniques used by attackers focus on undermining the confidentiality or the integrity of data. By far, the most common motivation of an attacker is to steal sensitive information such as credit card numbers or social security numbers, or alter information in an unauthorized fashion, such as increasing bank account balances or defacing a website. Some attacks, however, focus on disrupting the legitimate use of a system. Unlike other attacks these target the availability leg of the CIA triad. We call these attacks, denial-of-service or DoS attacks. A denial-of-service attack is an attack that makes a system or resource unavailable to legitimate users. It sends thousands or millions of requests to a network, server, or application overwhelming it…
Contents
-
-
-
-
-
-
-
-
-
-
(Locked)
Denial-of-service attacks4m 15s
-
(Locked)
Eavesdropping attacks4m 12s
-
(Locked)
DNS attacks3m 30s
-
(Locked)
Wireless attacks2m 54s
-
(Locked)
Propagation attacks4m 19s
-
(Locked)
Preventing rogues and evil twins2m 50s
-
(Locked)
Disassociation attacks2m 10s
-
(Locked)
Understanding Bluetooth attacks1m 23s
-
(Locked)
RFID security2m 17s
-
(Locked)
-
-