What do these threats have in common?




Download 58.92 Kb.
bet9/15
Sana30.03.2021
Hajmi58.92 Kb.
#13786
1   ...   5   6   7   8   9   10   11   12   ...   15
What do these threats have in common?

  • Processing: consumption of CPU cycles by infinite or very long programmatic looping.

  • Storage: large allocation of memory or file quota that blocks legitimate use of the same.

  • Excessive and unwanted use of screen space, printer paper, and so forth.

  • Causing a crash or error mechanism that interferes with normal usage or that requires restarting.

  • Elevation of privilege can exacerbate D.o.S. by gaining larger resource quotas.

Examples

  • SYN attacks and packet bombs that use various network protocol vulnerabilities to cause servers to crash.

  • Sophisticated buffer overflow problems, such as parameters with no length, can cause the server to chase a nonexistent memory location and crash. Similarly, GetAdmin-style handcrafted stacks can cause privileged instructions to shut down the system.

  • Common coding errors, such as unhandled memory allocation failures (referencing an invalid pointer), uninitialized memory (bad data used), use of freed memory and resources (referencing invalid memory), and miscalculations (divide by zero), can cause exceptions that would crash the software.

  • Weak policies (inherent in design or due to misconfiguration), such as a process taking up all CPU time.

  • Trojans, such as viruses, can also cause the software to become unusable.



Download 58.92 Kb.
1   ...   5   6   7   8   9   10   11   12   ...   15




Download 58.92 Kb.

Bosh sahifa
Aloqalar

    Bosh sahifa



What do these threats have in common?

Download 58.92 Kb.