HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.28 Denial of services

T 5.28 Denial of services

Such an attack aims to prevent IT users from using functions or devices which are normally available to them. This attack often takes place in connection with distributed resources, with the attacker using these resources to such a degree that other users are prevented from carrying out their work. Shortage of the following resources can intentionally take place: processes, CPU time, disk space, inodes, directories.

This can be carried out, for example, by:

.
© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
 
home