• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/5

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

5 Cards in this Set

  • Front
  • Back

the nasties and most difficult to address. they're very easy to launch, difficult to track, and it isnt easy to refuse the requests of the attacker, without also refusing legitimite requests for services. presmise of attack: send more requests to the machine than it can handle

denial-of-service (DoS)

undesirable for an uknown and un0trusted person to be able to execute commands on your server machines. two main classification: normal user access and adminstrator access

executing commands illicitly

occurs when an attacker changes entries in records

data diddling

some attackers like to delete things

data destruction

essential to the security of the internet infrastructure is ensuring the reliablilty and secure use of the three key protocols: the internet protocol (IP), the domain name system (DNS), the border gateway protocol (BGP)

secure the protocols