From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Denial of service attacks

Denial of service attacks

- [Instructor] By this point, you should know that the CIA triad describes the three goals of information security, confidentiality, integrity, and availability. Most of the attack techniques used by attackers, focus on undermining the confidentiality or the integrity of data. By far the most common motivation of an attacker is to steal sensitive information such as credit card numbers or social security numbers, or alter information in an unauthorized fashion, such as increasing bank account balances, or defacing a website. Some attacks, however, focus on disrupting the legitimate use of a system. Unlike other attacks, these target the availability leg of the CIA triad. We call these attacks denial of service or DoS attacks. A denial of service attack is an attack that makes a system or resource unavailable to legitimate users. It sends thousands or millions of requests to a network, server or application, overwhelming…

Contents