Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is DDoS Attacks

Handbook of Research on Cyber Law, Data Protection, and Privacy
These is used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources. Large networks of infected devices known as Botnets are created by depositing malware on users’ computers. The hacker then hacks into the system once the network is down.
Published in Chapter:
The Vulnerability of Children in Cyberspace
Vibhuti Nakta (Panjab University, India) and Ekta Sood (HIMCAPES College of Law, India)
Copyright: © 2022 |Pages: 19
DOI: 10.4018/978-1-7998-8641-9.ch019
Abstract
The internet is a tremendous tool. It allows users to chat, read, play, and be entertained while viewing content from around the world. It's vibrant, diverse, and provides instant access to knowledge on any topic. Although the internet has many advantages, it still has some drawbacks. The internet can be a dangerous place for anyone, but children and teenagers are particularly at risk. Online dangers can have severe, expensive, and even tragic consequences, ranging from cyber bullies to social media posts that can come back to haunt them later in life. Children can unintentionally expose their families to cyber attacks by downloading malware that gives cyber criminals access to their parents' bank accounts or other sensitive information. The internet can be a dangerous place for children due to cyberbullying, sexual communication, identity theft, scams, and exposure to adult content. The chapter is an attempt to view in detail the possible menace of cyber crime, its types, and the national and international conventions and legislations on the same.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
AI-Based Cyber Defense for More Secure Cyberspace
Malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Ecosystem Security Issues for Organizations and Governments: Digital Ethics and Privacy
This refers to distributed denial of service attacks. Here, a malicious attempt is made to disrupt normal traffic of a targeted server, service, or network by overwhelming the channel capacity of the target or its surrounding infrastructure with a flood of Internet traffic.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR