19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.28 Denial of services<br />

Such an attack aims to prevent <strong>IT</strong> users from using functions or devices which<br />

are normally available to them. This attack often takes place in connection<br />

with distributed resources, with the attacker using these resources to such a<br />

degree that other users are prevented from carrying out their work. Shortage of<br />

the following resources can intentionally take place: processes, CPU time,<br />

disk space, inodes, directories.<br />

This can be carried out, for example, by:<br />

- starting any number of programs simultaneously,<br />

- starting numerous programs at the same time which use a lot of CPU time,<br />

- occupation of all free inodes within a UNIX system so that no new files<br />

can be created,<br />

- creation of a large number of small files in a directory on a DOS PC so that<br />

no new files can be created inside this directory,<br />

- deliberately overloading the network,<br />

- cutting off network connections.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!