Template:Security guidelines: Difference between revisions
(Created page with " <table class="nd-othertables"> <tr> <th width="200">Security measurement type</th> <th width="200">Security measurement name</th> <th width="200">...") |
No edit summary |
||
Line 1: | Line 1: | ||
<table class=" | <table class="wikitable"> | ||
<tr> | <tr> | ||
<th width="200">Security measurement type</th> | <th width="200">Security measurement type</th> | ||
Line 11: | Line 11: | ||
<td>SYN Flood Protection</td> | <td>SYN Flood Protection</td> | ||
<td>On</td> | <td>On</td> | ||
<td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic./td> | <td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td></td> | <td>Remote ICMP Requests</td> | ||
<td></td> | <td>On</td> | ||
<td></td> | <td>An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings).</td> | ||
</tr> | |||
<tr> | |||
<td>SSH Attack Prevention</td> | |||
<td>Off</td> | |||
<td>A Secure Shell (SSH) flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with SSH requests.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td></td> | <td>HTTP Attack Prevention</td> | ||
<td></td> | <td>Off</td> | ||
<td></td> | <td>A Hypertext Transfer Protocol (HTTP) flood attack is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with HTTP requests.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td></td> | <td>HTTPS Attack Prevention</td> | ||
<td></td> | <td>Off</td> | ||
<td></td> | <td>HyperText Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td></td> | <td rowspan="5"> DDOS Prevention</td> | ||
<td></td> | <td>SYN Flood Protection</td> | ||
<td></td> | <td>On</td> | ||
<td>A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.</td> | |||
</tr> | </tr> | ||
</table> | </table> |
Revision as of 13:10, 27 January 2020
Security measurement type | Security measurement name | By default | Details |
---|---|---|---|
DDOS Prevention | SYN Flood Protection | On | A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. |
Remote ICMP Requests | On | An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests (pings). | |
SSH Attack Prevention | Off | A Secure Shell (SSH) flood attack, is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with SSH requests. | |
HTTP Attack Prevention | Off | A Hypertext Transfer Protocol (HTTP) flood attack is a common denial-of-service attack in which an attacker attempts to overwhelm a targeted device with HTTP requests. | |
HTTPS Attack Prevention | Off | HyperText Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP | |
DDOS Prevention | SYN Flood Protection | On | A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. |