Sinkhole (computers)/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} ==Parent topics== {{r|Denial of service}} {{r|Fault tolerance}} ==Subtopics== {{r|Backscatter (computers)}} {{r|Blackhole route injection}} ==Other related topics== {{r|...) |
imported>Howard C. Berkowitz |
||
Line 16: | Line 16: | ||
{{r|Electronic warfare}} | {{r|Electronic warfare}} | ||
{{r|Honeypot}} | {{r|Honeypot}} | ||
{{r|Internet Protocol flow information export}} | |||
{{r|Network intrusion detection system}} | {{r|Network intrusion detection system}} | ||
{{r|Host intrusion detection system}} | {{r|Host intrusion detection system}} |
Revision as of 09:13, 12 June 2009
- See also changes related to Sinkhole (computers), or pages that link to Sinkhole (computers) or to this page or whose text contains "Sinkhole (computers)".
Parent topics
- Denial of service [r]: An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [e]
- Fault tolerance [r]: A characteristic of a system such that it can have one or more subcomponents fail, yet have the system continue to operate with at least partial functionality [e]
Subtopics
- Backscatter (computers) [r]: Add brief definition or description
- Blackhole route injection [r]: Add brief definition or description
- Amplification attack [r]: A means of denying service from computers, networks, or both, not by the direct volume or resource consumption of the attack stimulus itself, but by the volume of responses that it generates [e]
- Anycasting [r]: A technique for increasing load distribution and fault tolerance in networks with multiple copies of a read-only server function, but with the same unicast address. [e]
- Access control list [r]: Add brief definition or description
- Electronic warfare [r]: A subset of information operations that deals with the use of electromagnetic or kinetic means to degrade an enemy's military electronics systems, to be able to operate one's own electronics in the face of enemy attacks, and to evade those attacks through protection or deception [e]
- Honeypot [r]: A hardened but isolated component of a network or computer, which is intended to be attractive to miscreants and invite attacks, with the goals of early warning and diverting the attack from critical resources [e]
- Internet Protocol flow information export [r]: Methods to collect and report flow (Internet Protocol) statistics for network operations and management; tends to focus on traffic among network elements while Simple Network Management Protocol and syslog look inside the network elements [e]
- Network intrusion detection system [r]: Add brief definition or description
- Host intrusion detection system [r]: Add brief definition or description