written 8.7 years ago by | • modified 8.7 years ago |
This question appears in Mumbai University > Software Testing & Quality Assurance Subject
Marks: 5 M
Year: Dec 2013
written 8.7 years ago by | • modified 8.7 years ago |
This question appears in Mumbai University > Software Testing & Quality Assurance Subject
Marks: 5 M
Year: Dec 2013
written 8.7 years ago by |
A Denial Of Service (DOS) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have.
In a distributed denial-of-service, large numbers of compromised systems (sometimes called a botnet) attack a single target.
In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.
The basic types of DOS attack can include flooding the network to prevent legitimate network traffic or disrupting a particular individual from accessing a service.
The availability acceptance criteria in acceptance testing refer to the requirement that the data must be protected from a denial of service (DOS) to unauthorized users.
Confidentiality and Availability acceptance criteria provide support against DOS attack.
Privacy in communication is achieved by using encryption where all the customer data must be stored in a secure place in accordance with the policies of customer right.
Hence the system is protected against virus, worm and bot attacks thereby no unauthorized access to the system is permitted, that is, user authentication is performed.
Files and other data are also protected from unauthorized access thus preventing DoS attack.