Not all cyberattacks aim to steal data. Some attacks are designed to make systems unusable. In IB Computer Science, this type of attack is known as a Denial of Service (DoS) attack. When such attacks are launched on a larger scale using many systems, they are called Distributed Denial of Service (DDoS) attacks.
IB examiners expect students to explain how these attacks work, why they are effective, and their impact on availability.
What Is a Denial of Service (DoS) Attack?
A Denial of Service (DoS) attack occurs when:
- A system is overwhelmed with requests
- Legitimate users are unable to access services
The goal of a DoS attack is:
- To exhaust system resources
- To make a service unavailable
In IB terms, DoS attacks target availability, not confidentiality or integrity.
How DoS Attacks Work
DoS attacks work by:
- Flooding a system with traffic
- Consuming processing power, memory, or bandwidth
As a result:
- The system slows down
- Crashes
- Stops responding
Even well-secured systems can be affected because:
- The attack uses normal-looking requests
What Is a Distributed Denial of Service (DDoS) Attack?
A Distributed Denial of Service (DDoS) attack is an advanced form of DoS.
In a DDoS attack:
