Computer Security Incident Handling Guide (Chapters 4, 5, 6 and 8) NIST 800-61. Presented by: Emily Ecoff April 22, 2008. Denial of Service Incidents.
PowerPoint Slideshow about ' Computer Security Incident Handling Guide (Chapters 4, 5, 6 and 8) NIST 800-61' - markku
An Image/Link below is provided (as is) to download presentation
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
A denial of service (DoS) is an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units, memory, bandwidth, or disk space.
Using all available network bandwidth by generating unusually large volumes of traffic
Sending malformed TCP/IP packets to a server so that its operating system will crash
Sending illegal requests to an application to crash it
Making many processor-intensive requests so that the server’s processing resources are full
Consuming all available disk space by creating many large files
An unauthorized access incident occurs when a person gains access to resources that the person was not intended to have. It is typically gained through the exploitation of operating system or application vulnerabilities, the acquisition of usernames and passwords, or social engineering.
Guessing or cracking passwords
Viewing or copying sensitive data
Running a packet sniffer on a workstation to capture usernames and passwords
Using an unattended, logged-in workstation without permission