Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
5 Cards in this Set
- Front
- Back
the nasties and most difficult to address. they're very easy to launch, difficult to track, and it isnt easy to refuse the requests of the attacker, without also refusing legitimite requests for services. presmise of attack: send more requests to the machine than it can handle |
denial-of-service (DoS) |
|
undesirable for an uknown and un0trusted person to be able to execute commands on your server machines. two main classification: normal user access and adminstrator access |
executing commands illicitly |
|
occurs when an attacker changes entries in records |
data diddling |
|
some attackers like to delete things |
data destruction |
|
essential to the security of the internet infrastructure is ensuring the reliablilty and secure use of the three key protocols: the internet protocol (IP), the domain name system (DNS), the border gateway protocol (BGP) |
secure the protocols |