Skip to main content

Posts

Showing posts from December, 2023

Denial-of-Service Attacks in AWS

Customers can call the coffee shop to place their orders. After answering each call, a cashier takes the order and gives it to the barista. However, suppose a prankster calls in multiple times to place orders but needs to pick their drinks. This causes the cashier to be unavailable to take other customers' calls. The coffee shop can attempt to stop the false requests by blocking the phone number that the prankster is using. In this scenario, the prankster's actions resemble a denial-of-service attack. Denial-of-service attacks: A Denial-of-Service (DoS) attack is a malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices. There are several t...

Types of Servers

  Origin Server: An "Origin Server" is a key concept in network computing, particularly in the context of the internet and web services. Here's a detailed explanation of its role and functions: ·          Definitive Data Source ·          Handling Client Requests ·          Content Creation and Storage ·          Role in Content Delivery Networks (CDNs) ·          Dynamic Content Deliver ·          Web Hosting and Server Environment Proxy Server: A proxy server acts as an intermediary between a client (such as a computer or mobile device) and the internet. Its primary functions include: ·          Request Forwarding ·          Anonymity and Security ·   ...