From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Denial of service attacks
From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Denial of service attacks
- [Instructor] By this point, you should know that the CIA triad describes the three goals of information security, confidentiality, integrity, and availability. Most of the attack techniques used by attackers, focus on undermining the confidentiality or the integrity of data. By far the most common motivation of an attacker is to steal sensitive information such as credit card numbers or social security numbers, or alter information in an unauthorized fashion, such as increasing bank account balances, or defacing a website. Some attacks, however, focus on disrupting the legitimate use of a system. Unlike other attacks, these target the availability leg of the CIA triad. We call these attacks denial of service or DoS attacks. A denial of service attack is an attack that makes a system or resource unavailable to legitimate users. It sends thousands or millions of requests to a network, server or application, overwhelming…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- (Locked) Denial of service attacks4m 20s
- (Locked) Eavesdropping attacks4m 12s
- (Locked) DNS attacks3m 39s
- (Locked) Layer 2 attacks2m 5s
- (Locked) Network address spoofing3m 40s
- (Locked) Wireless attacks3m 3s
- (Locked) Propagation attacks4m 22s
- (Locked) Preventing rogues and evil twins2m 52s
- (Locked) Disassociation attacks2m 11s
- (Locked) Understanding Bluetooth and NFC attacks2m 4s
- (Locked)
-
-
-
-
-
-
-
-
-
-
-
-