Line 1: |
Line 1: |
− | {{Glossary|
| + | '''DoS Attacks''', or '''Denial of Service Attacks''', involve making a website or server unresponsive and inaccessible.<ref>[http://www.us-cert.gov/ncas/tips/ST04-015 Security Tip (ST04-015): Understanding Denial-of-Service Attacks] (February 6, 2013), United States Computer Emergency Readiness Team (United States Department of Homeland Security)</ref> This can be accomplished through flooding a website with so much traffic that it can no longer respond to queries or by using bugs in the system's security to "destabilize" it.<ref name="alto">[https://www.paloaltonetworks.com/resources/learning-center/what-is-a-denial-of-service-attack-dos.html Denial of Service Attack - Prevent DoS Attacks with Palo Alto Networks], Palo Alto</ref> A distributed denial of service attack ([[DDoS |DDoS]]) is one form of DoS attack that is particularly dangerous and has receive a lot of attention in the last few years. |
− | |note = '''This information is brought to you by<br> [http://dnsseal.wiki/ DNS Seal], a best practices wiki for DNS.'''
| |
− | | logo = DNS Seal.png
| |
− | |link = http://dnsseal.wiki/
| |
− | }}
| |
− | | |
− | '''DoS Attacks''', or '''Denial of Service Attacks''', involve making a website or server unresponsive and inaccessible.<ref>[http://www.us-cert.gov/ncas/tips/ST04-015 Security Tip (ST04-015): Understanding Denial-of-Service Attacks] (February 6, 2013), United States Computer Emergency Readiness Team (United States Department of Homeland Security)</ref> This can be accomplished through flooding a website with so much traffic that it can no longer respond to queries or by using bugs in the system's security to "destabilize" it.<ref name="alto">[https://www.paloaltonetworks.com/resources/learning-center/what-is-a-denial-of-service-attack-dos.html Denial of Service Attack - Prevent DoS Attacks with Palo Alto Networks], Palo Alto</ref> A distributed denial of service attack ([[DDoS Attacks|DDoS Attack]]) is one form of DoS attack that is particularly dangerous and has receive a lot of attention in the last few years. | |
| | | |
| ==Public Perception== | | ==Public Perception== |
Line 42: |
Line 36: |
| | | |
| ==Related Pages== | | ==Related Pages== |
− | *[[DDoS Attacks]] | + | *[[DDoS|DDoS Attack]] |
| | | |
| ==References== | | ==References== |