
November 13, 2024
Package delivery scams: What they are and how to avoid them
Package delivery scams rely on getting you to share your personal information. Learn how to recognize delivery fraud.
Learn moreDenial of Service (DoS) attacks overwhelm a system with traffic to cause a disruption in service, rendering the system inaccessible to its users.
The purpose of a DoS attack is to crash a network or device so that it is unavailable to users. A DoS attack overwhelms a system with traffic until it ceases functioning to deny users the service they’re anticipating. Most DoS attacks target high-profile web servers like those of banks, e-commerce sites, governments, trade organizations, or media outlets. Many DoS attacks don’t involve any type of theft—rather, they intend to inconvenience the targeted organization and cost them time and money to bring their system back online.
Stay safer online with one easy-to-use app1
1Microsoft 365 Personal or Family subscription required; app available as separate download
There are two types of DoS attacks: flood attacks and buffer overflow attacks.
One way to crash a system is to flood the network with packets—units of data that are grouped together and moved across network systems—until a server is overwhelmed and crashes. The attacker must have more bandwidth than the server its targeting in order for a flood attack to work.
A buffer overflow attack attempts to send more traffic to a system than that system has been built to handle. When this happens, a system uses all of its available memory, CPU time, and hard disk space, causing the system to run slowly or crash.
Unlike a DoS attack, which only requires a single connection for attack, a distributed denial of service (DDoS) attack leverages a network of devices to attack a target. DDoS attacks may incorporate botnets, which increases an attacker’s power and capacity for orchestrating large scale actions. In general, security technology can protect users against DoS attacks, but DDoS attacks are more complicated and may pose a greater security risk to network systems.
The effects of a DoS attack often resemble simple network connectivity or performance issues. Signs of a DoS attack to keep an eye out for include:
To diagnose a DoS attack, a firewall or intrusion detection system can monitor network traffic and identify disruptions. If you have reason to believe that your organization’s network is under attack, you should contact your network administrator. They’ll be able to determine whether the connectivity issue or outage is due to an attack or another issue.
Taking the following steps can help protect your system from attack and ensure that you have a plan in place should a DoS attack occur:
The cybersecurity landscape is constantly evolving. Check out more privacy and security tips and tricks to ensure that your systems and data are protected.
The powerful productivity apps and creativity tools in Microsoft 365 just got better. Work, play, and create better than ever before with the apps you love and Microsoft Copilot by your side.
Try for free