With etymological origin in Latin refusal, denial is a term linked to the verb deny, which refers to not grant what is required or demanded. Here are some sentences where its use is exemplified: “The government surprised the people with the denial of authorization for the marathon to take place in the city”, “Tomorrow I am going to go to the office so that they can explain to me the reason for the denial”, “The detainee, after the judge’s refusal, announced that he would appeal to the Supreme Court”.
Denial, therefore, is a negative answer to a request or yet order. Take the case of a club that wants to organize a concert to raise funds. As he anticipates the attendance of many people and his facilities are small, he plans to install the stage in the street. For this, however, you must request authorization from the governmentas you need to cut the road and interrupt the traffic. The club places the request, but it is rejected. The authorities justify the denial in the need for cars to be able to circulate on said street.
Another similar situation can occur within a business. An employee wishes to take an unpaid leave of absence for a trip. For this purpose, he sends a note to the president of the company, explaining his will. The manager responds with the denial and is based on the fact that his presence is essential for the moment, since he does not have an ideal replacement for his position.
The denial of assistance, on the other hand, is the crime in which a person incurs when, without a justification protected by law, he evades a public obligation and does not obey the request of an authority.
Within the field of computing, there is a concept called denial of service attack, also known for Two (Note the resemblance to Microsoft’s DOS, which is why it is important to write the “o” in lowercase). It is an attack directed at a computer system or a network, the consequence of which is that the services or resources provided by a company become inaccessible to customers. In general, it consists of consuming the bandwidth of an individual or group, causing a crash and interrupting the connection.
There is a variation of the DoS, called distributed denial of services (or DDoS), which practices its attack from different sources, considerably increasing the saturation of the server. Commonly, the so-called botnet to carry out these attacks against a system, given their moderate complexity and the fact that they act automatically and autonomously. On the other hand, it should be clarified that they can also have a constructive purpose, since they serve to verify the limits of transfer of information from a computer, so that they can be established before offering a product or service to consumers, thus avoiding potential disturbances such such as loss of information and unexpected interruptions of communication.
A DoS can be presented in different ways, since there are many techniques to generate it; however, they share the protocol group TCP / IP to find their goal. In short, features of one of these attacks are the following:
* the storage memory, processing capacity and bandwidth of one or more computers are consumed against the will of their owners;
* its configuration data is modified, ranging from superficial to those that compromise the stability of the equipment;
* the operation of some devices is interrupted;
* communication channels are blocked that would allow users affected to connect with the providers of the services that have been taken or altered.