Amplification attack/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} ==Parent topics== {{r|Information security}} {{r|Network security}} ==Subtopics== {{r|IP spoofing}} ==Other related topics== {{r|Botnet}} {{r|Distributed denial of service...) |
(No difference)
|
Revision as of 20:47, 22 February 2009
- See also changes related to Amplification attack, or pages that link to Amplification attack or to this page or whose text contains "Amplification attack".
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Network security [r]: Add brief definition or description
Subtopics
- Botnet [r]: A set of compromised computers which can collectively provide services to a "bot herder". [e]
- Distributed denial of service [r]: Add brief definition or description
- Ingress filtering [r]: A class of network security measures based on the assumption that a packet entering a network must be forged, if the network has no return route to its source address [e]
- Internet Protocol flow export [r]: Add brief definition or description
- Rate limiting (computer) [r]: Add brief definition or description
- Slammer worm [r]: An extremely infective piece of malware, specifically a worm (computers) that crippled the Internet in 2003 [e]