Jump to content

Template:Security guidelines: Difference between revisions

no edit summary
(Created page with " <table class="nd-othertables"> <tr> <th width="200">Security measurement type</th> <th width="200">Security measurement name</th> <th width="200">...")
 
No edit summary
Line 1: Line 1:


<table class="nd-othertables">
<table class="wikitable">
     <tr>
     <tr>
         <th width="200">Security measurement type</th>
         <th width="200">Security measurement type</th>
Line 11: Line 11:
       <td>SYN Flood Protection</td>
       <td>SYN Flood Protection</td>
       <td>On</td>
       <td>On</td>
<td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic./td>
<td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td></td>
       <td>Remote ICMP Requests</td>
       <td></td>
       <td>On</td>
       <td></td>
       <td>An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings).</td>
    </tr>
    <tr>
      <td>SSH Attack Prevention</td>
      <td>Off</td>
      <td>A Secure Shell (SSH) flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with SSH requests.</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td></td>
       <td>HTTP Attack Prevention</td>
       <td></td>
       <td>Off</td>
       <td></td>
       <td>A Hypertext Transfer Protocol (HTTP) flood attack is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with HTTP requests.</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td></td>
       <td>HTTPS Attack Prevention</td>
       <td></td>
       <td>Off</td>
       <td></td>
       <td>HyperText Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td></td>
       <td rowspan="5"> DDOS Prevention</td>
       <td></td>
       <td>SYN Flood Protection</td>
       <td></td>
       <td>On</td>
<td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.</td>
     </tr>
     </tr>
</table>
</table>
0

edits