Changes

Jump to: navigation, search

An Overview of IT Security Threats and Attacks

863 bytes added, 16:31, 13 February 2008
Distributed Denial of Service (DDoS) Attacks
== Distributed Denial of Service (DDoS) Attacks ==
 
The Denial of Service (DoS) attacks outlined above involve the use of a single client to launch an attack on a system or service. Distributed Denial of Service Attacks use the same basic attack methodologies as outline above with the exception that the attacks are initiated from multiple client systems.
 
The way this typically works is that malicious parties will subtly gain control over large numbers of computers (typically poorly defended home computers connected to broadband internet connections via a virus of some sort). Unbeknown to the owner of the computer (which generally continues to function as normal) the system is essential a zombie waiting to be given instructions> once the malicious party has gathered an army of zombie computers they are instructed to participate in massive DoS attacks on unsuspecting victims.
 
== Back Door Attacks ==

Navigation menu