- buffer overflows — this is how the Blaster worm was able to propagate
- networking protocol flaws.
"Today it is common for an attack to have multiple vectors. A DDoS attack carried out by botnets along multiple vectors can interrupt services for days, weeks, or even months. More sophisticated attacks take advantage of vectors that amplify their strength through a process that generates exponential reverberations. The ability to amplify an attack, for instance by tricking a server into responding to a target with an even larger packet than what was originally sent, increases an already substantial asymmetric advantage."
- ↑ ICS-CERT, Common Cyber Security Language (full-text).
- ↑ Cyber Operations in DOD Policy and Plans: Issues for Congress, at 4.
See also Edit
|This page uses Creative Commons Licensed content from Wikipedia (view authors).|