Sinkhole (computers)/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
No edit summary
 
(One intermediate revision by one other user not shown)
Line 13: Line 13:
{{r|Amplification attack}}
{{r|Amplification attack}}
{{r|Anycasting}}
{{r|Anycasting}}
{{r|Access control list}}
{{r|Electronic warfare}}
{{r|Electronic warfare}}
{{r|Honeypot}}
{{r|Honeypot}}
Line 19: Line 18:
{{r|Network intrusion detection system}}
{{r|Network intrusion detection system}}
{{r|Host intrusion detection system}}
{{r|Host intrusion detection system}}
==Articles related by keyphrases (Bot populated)==
{{r|Tycho Brahe}}
{{r|Sinkhole (Computer network)}}

Latest revision as of 16:01, 18 October 2024

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Sinkhole (computers).
See also changes related to Sinkhole (computers), or pages that link to Sinkhole (computers) or to this page or whose text contains "Sinkhole (computers)".


Parent topics

  • Denial of service [r]: An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [e]
  • Fault tolerance [r]: A characteristic of a system such that it can have one or more subcomponents fail, yet have the system continue to operate with at least partial functionality [e]

Subtopics

Other related topics

Articles related by keyphrases (Bot populated)

  • Tycho Brahe [r]: Danish astronomer of the 16th century. [e]
  • Sinkhole (Computer network) [r]: Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be analyzed with appropriate forensics and diagnostics [e]