This is a dedicated watch page for a single video.
Emma, a cybersecurity analyst, is investigating an incident where their company's website was inaccessible for several hours. The server was overwhelmed with an unusually high amount of traffic during this time. Which type of attack is this scenario indicative of?