Jacob, an attacker, targeted container technology to destroy the reputation of an organization. To achieve this, he initially compromised a single container exploiting weak network defaults, overloaded the rest of the containers in the local domain, and restricted them from providing services to legitimate users.
Identify the type of attack initiated by Jacob in the above scenario.
Sherell
4 months agoTerrilyn
5 months agoJanae
5 months agoAvery
5 months agoLashawn
5 months agoJarvis
6 months agoAudra
6 months agoJillian
6 months agoStephania
6 months agoDarrin
6 months agoGaston
6 months agoKirk
6 months agoGolda
6 months agoRosio
6 months agoMicah
6 months agoWenona
11 months agoBonita
9 months agoHershel
9 months agoSlyvia
9 months agoKatheryn
10 months agoGabriele
11 months agoElroy
11 months agoCharlie
10 months agoHyun
10 months agoNana
10 months agoMelita
12 months agoWava
10 months agoMona
10 months agoMargart
11 months agoAlpha
12 months agoAlyce
11 months agoMi
11 months agoSamira
11 months agoMozell
11 months agoJodi
12 months agoLatanya
1 year agoIsaac
1 year ago