Sinkhole (computers)/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(New page: {{subpages}} ==Parent topics== {{r|Denial of service}} {{r|Fault tolerance}} ==Subtopics== {{r|Backscatter (computers)}} {{r|Blackhole route injection}} ==Other related topics== {{r|...)
 
m (Text replacement - "{{r|Access control list}}↵" to "")
 
(One intermediate revision by one other user not shown)
Line 13: Line 13:
{{r|Amplification attack}}
{{r|Amplification attack}}
{{r|Anycasting}}
{{r|Anycasting}}
{{r|Access control list}}
{{r|Electronic warfare}}
{{r|Electronic warfare}}
{{r|Honeypot}}
{{r|Honeypot}}
{{r|Internet Protocol flow information export}}
{{r|Network intrusion detection system}}
{{r|Network intrusion detection system}}
{{r|Host intrusion detection system}}
{{r|Host intrusion detection system}}

Latest revision as of 05:38, 15 March 2024

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Sinkhole (computers).
See also changes related to Sinkhole (computers), or pages that link to Sinkhole (computers) or to this page or whose text contains "Sinkhole (computers)".


Parent topics

  • Denial of service [r]: An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [e]
  • Fault tolerance [r]: A characteristic of a system such that it can have one or more subcomponents fail, yet have the system continue to operate with at least partial functionality [e]

Subtopics

Other related topics