3. Create a denial of service
Hackers don't always want to gain privileges when they attack a company. Sometimes, they simply want to cause harm by disrupting a resource such as a network or system. To achieve this goal, he uses techniques that are often much simpler to implement than those we've already seen.
3.1 Resource saturation
The simplest methods include saturating network resources (usually bandwidth) or system resources (number of sessions, bandwidth, etc.). To achieve this, there are a number of different techniques, each of which affects a specific element of the resource.
-
Flooding saturates the network
The flooding principle is very simple. It's based on the fact that the hacker can generate more bandwidth...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Create a denial of service
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Requests For Comments
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!