"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world.
Coordinate the actions performed by a collection of collaborating task instances in a distributed application by electing one instance as the leader that assumes responsibility for managing the other instances.
Have each component of the system participate in the decision-making process about the workflow of a business transaction, instead of relying on a central point of control.
Process a set of related messages in a defined order, without blocking processing of other groups of messages.
2. DDoS
In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.
#
Title
Link
1
What is a DDoS Attack?
4
What is a DDoS Botnet?
5
What is DDoS Mitigation?
6
What is Blackhole Routing?
7
What is a Denial-of-Service (DoS) Attack?
8
What is IP Spoofing?
9
What Is The OSI Model?
10
What is TCP/IP?
11
What is the Internet Control Message Protocol (ICMP)?
12
What is Layer 7? - How Layer 7 of the Internet Works
13
What is a WAF? - Web Application Firewall explained
14
What is Malware?
15
What is UDP?
16
Famous DDoS attacks - The largest DDoS attacks of all time
2.1 Common DDoS Attacks
#
Title
Link
1
Memcached DDoS Attack
2
NTP Amplification DDoS Attack
3
DNS Amplification Attack
4
SSDP DDoS Attack
5
What is a DNS Flood? - DNS Flood DDoS Attack
6
HTTP Flood Attack
7
SYN Flood Attack
8
UDP Flood Attack
9
Ping (ICMP) Flood DDoS Attack
10
What is a low and slow attack?
11
Application Layer DDoS Attack
12
How Do Layer 3 DDoS Attacks Work? - L3 DDoS
13
Cryptocurrency DDoS Attacks
14
What Is an ACK Flood DDoS Attack? - Types of DDoS Attacks
15
What Is a QUIC Flood DDoS Attack? - QUIC and UDP Floods
16
What is a ransom DDoS attack?
17
Smurf DDoS Attack
18
Ping of Death DDoS attack
2.2 DDoS Attack Tools
#
Title
Link
1
How to DDoS - DoS and DDoS Attack tools
2
What Is The Low Orbit Ion Cannon (LOIC)?
3
What Is The High Orbit Ion Cannon (HOIF)?
4
R U Dead Yet? (R.U.D.Y.) Attack
5
Slowloris DDoS Attack
6
What is a DDoS Booter/IP Stresser? - DDoS Attack Tools
3. Microservice
Microservices - also known as the microservice architecture - is an architectural style that structures an application as a collection of services that are
Highly maintainable and testable
Loosely coupled
Independently deployable
Organized around business capabilities
Owned by a small team
The microservice architecture enables the rapid, frequent and reliable delivery of large, complex applications. It also enables an organization to evolve its technology stack.