Denial-of-Service Attack:
In DOS Attack after gaining
- Randomize the attention of your internal Information Systems staff so that they do not see the intrusion immediately, which allows the attacker to make more attacks during the diversion.
- Send invalid data to
applications or network services, which causes abnormal termination or behavior of the applications or services. - Flood a computer or the entire network with traffic until a shutdown occurs because of the overload.
- Block traffic, which results in a loss of access to network resources by authorized users.
Intrusion:
The most common attacks on your systems are intrusions; with intrusions, people are actually able to use your
Buffer Overflows:
Buffer overflows are caused by users entering huge amounts of data into the forms of your website. This data is sent to the
A session is a link created once a user provides authentication (ie username and