With etymological origin in the Latin denegatĭo, denial is a term linked to the verb deny, which refers to not granting what is required or demanded. Here are some sentences that exemplify its use: “The government surprised the people with the denial of authorization for the marathon to take place in the city”, “Tomorrow I am going to go to the office so that they can explain to me why what about the refusal”, “The detainee, after the judge’s refusal, announced that he would appeal to the Supreme Court”.
The denial, therefore, is a negative response to a request or request. Take the case of a club that wants to organize a concert to raise funds. As he anticipates the attendance of many people and his facilities are small, he plans to install the stage on the street. For this, however, you must ask the government for authorization, since you need to cut off the street and interrupt traffic. The club makes the request, but it is rejected. The authorities justify the denial in the need for cars to be able to circulate on said street.
Another similar situation can occur within a company. An employee wants to take unpaid leave for a trip. For this purpose, she sends a note to the president of the company, explaining her will. The manager responds with the denial and relies on the fact that her presence is essential for the moment, since she does not have a suitable replacement for her position.
The denial of assistance, on the other hand, is the crime in which a person incurs when, without a justification protected by law, he evades a public obligation and does not obey the request of an authority.
Within the field of computing, there is a concept called a denial of service attack, also known as DoS (note the resemblance to Microsoft’s DOS, which is why it is important to write the “o” in lower case). It is an attack directed at a computer system or a network, the consequence of which is that the services or resources provided by a company become inaccessible to customers. In general, it consists of consuming the bandwidth of an individual or group, causing a collapse and interrupting the connection.
There is a variation of DoS, called Distributed Denial of Services (or DDoS), which carries out its attack from different sources, considerably increasing server saturation. Commonly, so-called botnets are used to carry out these attacks against a system, given their moderate complexity and the fact that they act automatically and autonomously. On the other hand, it should be clarified that they can also have a constructive purpose, since they serve to verify the limits of transfer of information from a computer, so that they can be established before offering a product or service to consumers, thus avoiding potential disorders such as such as loss of information and unexpected communication cuts.
A DoS can be presented in different ways, since there are many techniques to generate it; however, they share the TCP/IP protocol group to find their target. In summary, the characteristics of one of these attacks are as follows:
* the storage memory, processing capacity and bandwidth of one or more computers are consumed against the will of their owners;
* your configuration data is modified, ranging from superficial to those that compromise the stability of the equipment;
* the operation of some devices is interrupted;
* Communication channels that would allow affected users to connect with service providers that have been taken away or altered are blocked.