Sinkhole (computers)/Related Articles: Difference between revisions
Jump to navigation
Jump to search
John Leach (talk | contribs) m (Text replacement - "{{r|Access control list}}↵" to "") |
No edit summary |
||
Line 18: | Line 18: | ||
{{r|Network intrusion detection system}} | {{r|Network intrusion detection system}} | ||
{{r|Host intrusion detection system}} | {{r|Host intrusion detection system}} | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Tycho Brahe}} | |||
{{r|Sinkhole (Computer network)}} |
Latest revision as of 16:01, 18 October 2024
- See also changes related to Sinkhole (computers), or pages that link to Sinkhole (computers) or to this page or whose text contains "Sinkhole (computers)".
Parent topics
- Denial of service [r]: An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [e]
- Fault tolerance [r]: A characteristic of a system such that it can have one or more subcomponents fail, yet have the system continue to operate with at least partial functionality [e]
Subtopics
- Backscatter (computers) [r]: Add brief definition or description
- Blackhole route injection [r]: Add brief definition or description
- Amplification attack [r]: A means of denying service from computers, networks, or both, not by the direct volume or resource consumption of the attack stimulus itself, but by the volume of responses that it generates [e]
- Anycasting [r]: A technique for increasing load distribution and fault tolerance in networks with multiple copies of a read-only server function, but with the same unicast address. [e]
- Electronic warfare [r]: A subset of information operations that deals with the use of electromagnetic or kinetic means to degrade an enemy's military electronics systems, to be able to operate one's own electronics in the face of enemy attacks, and to evade those attacks through protection or deception [e]
- Honeypot [r]: A hardened but isolated component of a network or computer, which is intended to be attractive to miscreants and invite attacks, with the goals of early warning and diverting the attack from critical resources [e]
- Internet Protocol flow information export [r]: Methods to collect and report flow (Internet Protocol) statistics for network operations and management; tends to focus on traffic among network elements while Simple Network Management Protocol and syslog look inside the network elements [e]
- Network intrusion detection system [r]: Add brief definition or description
- Host intrusion detection system [r]: Add brief definition or description
- Tycho Brahe [r]: Danish astronomer of the 16th century. [e]
- Sinkhole (Computer network) [r]: Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be analyzed with appropriate forensics and diagnostics [e]