Access over 35 million academic & study documents

Cybersecurity

Content type
User Generated
Subject
Computer Science
Type
Homework
Rating
Showing Page:
1/6

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/6

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/6

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 6 pages?
Access Now
Unformatted Attachment Preview
Running Head: NETWORK SECURITY 1 Network Security Student’s Name Institution of Affiliation Course Date NETWORK SECURITY 2 Introduction Network Security is a significant aspect in the daily use of computers and computer resources in businesses and organizations. It is designed to protect the use and integrity of data and a network. By the collective use of both hardware and software technologies, network security manages the access of users to a network by targeting threats that come in various forms. Computer threats may deny services to end users delete or replace data. Such threats may include; Denial of Service attacks, viruses, SQL injection attack or Buffer-overflow attack. Question 1 The common tools used for a Denial of Service (DoS) attack In computer network security, Denial of Service attack refers to a cyber-attack where doers seek to make a machine or network resources unavailable to the end users. They do so by deliberately and indeterminately disrupting the services of a host computer which is connected to the internet temporarily (Kizza, 2015). By flooding the targeted resources with numerous requests so that systems can be overloaded and legitimate requests prevented from being fulfilled, perpetrators accomplish Denial of Service attacks (Kizza, 2015). There exist three types of Denial of Service attacks which are; Bandwidth attacks, protocol attacks, and software vulnerability attacks. Bandwidth attacks are upfront and consume resources. Software vul ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Excellent resource! Really helped me get the gist of things.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents