tailieunhanh - ecomm book hack proofing your ecommerce site phần 3

Làm thế nào tôi có thể xây dựng một ý thức tốt hơn về nhận thức an ninh trong tổ chức của tôi? Tôi đã cố gắng áp phích và xuất bản chính sách của chúng tôi, nhưng nó dường như không được làm việc. | 112 Chapter 2 DDoS Attacks Intent Tools and Defense quite effective primarily because it can be launched by a hacker with limited resources and has the added advantage of obscuring the source of the attack in the first place. 0 An amplification attack achieves its effectiveness by enlisting the aid of other networks that act as amplifiers for the attack. This allows hackers with limited resources to target victims with a considerable increase in resources. The networks used in the amplification attacks are usually oblivious to their part in the whole examples of amplification attacks are the whimsically named Smurf and Fraggle. 0 A malformed packet attack usually consists of a small number of packets directed at a target server or packets are constructed in such a fashion that on receipt of the packet the target panics. A panic is considered to occur when the device or operating system enters an unstable state potentially resulting in a system crash. A classic DoS malformed packet attack is the Ping of Death. 0 An often-neglected aspect of securing a site against DoS attacks is ensuring physical security. Not only must the physical security of the servers be considered but also the cabling and power infrastructures. 0 Indirect attacks could also become more relevant as DoS attacks attain greater subtlety. A savvy hacker could target the weakest link in your business chain instead of mounting a full frontal assault on the business itself. 0 One of the significant differences in methodology of a DDoS attack is that it consists of two distinct phases. During the first phase the perpetrator compromises computers scattered across the Internet and installs specialized software on these hosts to aid in the attack. In the second phase the compromised hosts referred to as zombies are then instructed through intermediaries called masters to commence the attack. Microsoft became next in the line of bemused businesses subjected to successful DDoS .

TỪ KHÓA LIÊN QUAN