ADM 2372 Lecture Notes - Lecture 17: Data Warehouse, Relational Database, Denial-Of-Service Attack
Document Summary
Or published in a public repository, but the related private key remains private: denial of service attack, denial of service (dos) attack. > flood of messages sent to a server in order to crash it. > the intent is to deny access to legitimate users: distributed denial of service (ddos) attack. > dos attack comes from numerous sites, it is harder to detect and protect against. > use lters to identify messages with a common characteristic (e. g. , coming from the same site) > place choke points in the system: a router can have a limit built into it that disallows the sudden. > be prepared : backup equipment, it sta should prepare & rehearse for a dos attack, etc. Field: group of characters representing an attribute or characteristic (name) Record (row): group of related elds describing an entity (e. g. , person, event) Table (relation): group of related records of the same type (group of students)