1 00:00:12,850 --> 00:00:18,630 Let us start with a news section, denial of service, also called Hazardous. 2 00:00:19,630 --> 00:00:25,500 In this lecture, we will have an overview to what is denial of service or denial of service attack 3 00:00:25,510 --> 00:00:31,600 also to the doctor, that is a cyber attack in which the hacker seeks to make a machine on network resource 4 00:00:31,600 --> 00:00:38,920 unavailable to its intended users by temporarily or indefinitely disrupting services of who's connected 5 00:00:38,920 --> 00:00:39,670 to the Internet. 6 00:00:39,880 --> 00:00:45,850 Denial service is typically accomplished by flooding the targeting machine or resource with a superfluous 7 00:00:45,870 --> 00:00:46,330 request. 8 00:00:46,480 --> 00:00:54,610 Or you can see actually bogus or unwanted requests in an attempt to overload systems and prevent some 9 00:00:54,610 --> 00:00:57,350 or all legitimate requests from being fulfilled. 10 00:00:58,090 --> 00:01:01,490 Now, in a distributed denial of service, that is, the details attack. 11 00:01:01,630 --> 00:01:05,860 The incoming traffic from the victim originates from many different sources. 12 00:01:06,520 --> 00:01:11,110 This effectively makes it impossible to stop the attacks simply by blocking a single source. 13 00:01:11,440 --> 00:01:13,170 But does other details. 14 00:01:13,180 --> 00:01:19,090 Attack is analogous to a group of people crowding the entry door of a shop, making it harder for legitimate 15 00:01:19,090 --> 00:01:22,370 customers to enter, therefore disrupting the trade. 16 00:01:22,610 --> 00:01:30,190 Criminals often often targets sites or services posted on high profile Web servers such as banks or 17 00:01:30,190 --> 00:01:31,570 credit card payment gateways. 18 00:01:31,870 --> 00:01:35,860 Revenge blackmail activism can motivate these types of attacks. 19 00:01:36,250 --> 00:01:42,010 A denial of service attack is any type of attack that prevents individuals from accessing a particular 20 00:01:42,010 --> 00:01:43,240 resource or service. 21 00:01:43,870 --> 00:01:49,860 Essentially, the attack affects the availability of Internet or network based services, which hurts 22 00:01:49,870 --> 00:01:56,620 under the golden and information security that the CIA tried, which stands for confidentiality, integrity 23 00:01:56,620 --> 00:01:57,580 and availability. 24 00:01:57,790 --> 00:02:04,120 This is why information security professionals care about this DOS attack and constantly determine methods 25 00:02:04,460 --> 00:02:05,110 mediated. 26 00:02:05,470 --> 00:02:11,560 Well, on your screen you can see that there is a hacker who has compromised the command and control 27 00:02:11,560 --> 00:02:13,110 server on that server. 28 00:02:13,390 --> 00:02:20,250 There are various bottlenecks and also Hacker has compromised all those computer systems, also called 29 00:02:20,260 --> 00:02:21,030 as botnet. 30 00:02:21,340 --> 00:02:28,660 And now these partners are floating a particular victims server or also you can call a particular victim's 31 00:02:28,660 --> 00:02:29,570 computer system. 32 00:02:29,980 --> 00:02:35,650 Therefore, the system will crash and the hacker is successful in getting autodidacts or attack. 33 00:02:36,160 --> 00:02:40,120 In the next lecture, we will see categories of DOS attack.