Describe a situation in which absolute denial of a service to a user ( that is, the user gets no response from the computer) is a serious problem to that user. Describe another example where 10 percent denial of service ( that is, the user's computation progresses, but at a rate 10% slower than usual) is a serious problem to that user. Could access by unauthorized people to a computing system result in a ten percent denial of service to the legitimate users? If so, how?

Question
Asked Sep 4, 2019

Describe a situation in which absolute denial of a service to a user ( that is, the user gets no response from the computer) is a serious problem to that user. Describe another example where 10 percent denial of service ( that is, the user's computation progresses, but at a rate 10% slower than usual) is a serious problem to that user. Could access by unauthorized people to a computing system result in a ten percent denial of service to the legitimate users? If so, how?

check_circleExpert Solution
Step 1

Denial of Service (DoS) :

  • The Denial of Service (DoS) makes a resource (site, application, server) unavailable for the purpose it was designed. It is an attack to the service called Denial of Service (DoS)attack.
  • There are many ways to make a service unavailable for legitimate users by manipulating network packets, programming, logical, or resources handling vulnerabilities, among others.
  • If a service receives a very large number of requests, it may cease to be available to legitimate users. In the same way, a service may stop if a programming vulnerability is exploited, or the way the service handles resources it uses.
  • Sometimes the attacker can inject and execute arbitrary code while performing a DoS attack in order to access critical information or execute commands on the server.
  • The Denial-of-service attacks significantly degrade the service quality experienced by legitimate users. These attacks introduce large response delays, excessive losses, and service interruptions, resulting in direct impact on availability.
Step 2

Example for DoS:

 DoS Locking Customer Accounts:

  • The first DoS case to consider involves the authentication system of the target application.
  • A common defense to prevent brute-force discovery of user passwords is to lock an account from use after between three to five failed attempts to login. This means that even if a legitimate user were to provide their valid password, they would be unable to login to the system until their account has been unlocked. This defense mechanism can be turned into a DoS attack against an application if there is a way to predict valid login accounts.

Recent DoS Attack:

Cyber Bunker Launches “World&rsqu...

Want to see the full answer?

See Solution

Check out a sample Q&A here.

Want to see this answer and more?

Solutions are written by subject experts who are available 24/7. Questions are typically answered within 1 hour*

See Solution
*Response times may vary by subject and question
Tagged in

Engineering

Computer Science

Related Computer Science Q&A

Find answers to questions asked by student like you

Show more Q&A add
question_answer

Q: Write a function “gcDivisor” that takes two positive int “k” and “m” and returns the greatest common...

A: A call is made to a function called gcd with the numerator and denominator after receiving the user ...

question_answer

Q: If you are reading a flat file, with minimal information regarding business rules and constraints. H...

A: Solution:Even though the file contains minimal information about business rules and constraints, the...

question_answer

Q: Let L1 = L (a∗baa∗) and L2 = L (aba∗). Find L1/L2.

A: Solution:Given that,Input: L1= L(a*baa*) and L2 = L(aba*) Output: Determine the L1/L2.We take all st...

question_answer

Q: This program uses hours, pay rate, state tax and fed tax to determine grossand net pay. The code is ...

A: Program Descriptions:The given program does not have any errors.It takes input from a file named pay...

question_answer

Q: Use Java 5-1) (Count positive and negative numbers and compute the average of numbers) Write a progr...

A: Note: The below program has been complied and executed in NetBeans IDE 8.2

question_answer

Q: write a program to convert between KPH and MPH in either direction. in Eclipse.If you are driving ac...

A: Hey,,,We  have to use scanner class  to get input .So we will import scanner package to access the s...

question_answer

Q: Consider the following two assertions. Assume x is a specific but unknown real number.a. x < 2 o...

A: Let us name the statements as following:For expression (a)A: x < 2B: Not(1 < x < 3)so the e...

question_answer

Q: How to write a function in python where it takes a list of string s. Where s= ["hello","lazyness","p...

A: The program has the following algorithm:Intitialize the counter counting string list position number...

question_answer

Q: This is for pygame Ball Class: The Ball class inherits from Drawable and it will draw a circle at it...

A: The class Ball to draw a circle at its current location:Import the Drawable class and pygame module....