This site uses cookies. By continuing to browse the ConceptDraw site you are agreeing to our Use of Site Cookies.
This computer security diagram example was designed on the base of the Wikimedia Commons file: Fork bomb.svg.
"Fork bomb principle. The processes are recursively forked, resulting in a saturation of the available ressources and denial of service." [commons.wikimedia.org/ wiki/ File:Fork_ bomb.svg]
This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported license. [creativecommons.org/ licenses/ by-sa/ 3.0/ deed.en]
"In computing, a fork bomb (also called rabbit virus or wabbit) is a denial-of-service attack wherein a process continually replicates itself to deplete available system resources, slowing down or crashing the system due to resource starvation. ...
Fork bombs operate both by consuming CPU time in the process of forking, and by saturating the operating system's process table. A basic implementation of a fork bomb is an infinite loop that repeatedly launches the same process." [Fork bomb. Wikipedia]
The cybersecurity diagram example "Fork bomb" was created using the ConceprDraw PRO software extended with the Network Security Diagrams solution from the Computer and Neworks area of ConceptDraw Solution Park.
Computer security diagram
Computer security diagram, bomb, block diagrams, arrow one-way,

Concept Maps

As concept map consists from conception-blocks and links between them, you can use ConceptDraw library objects and add to a document as much objects as you need. ConceptDraw tools let you to edit, group, move objects, change their appearance and add text signs and raster or vector pictures.
ConceptDraw PRO diagramming and vector drawing software extended with Concept Maps Solution from the "What is a Diagram" Area is effective tool for creating professional looking Concept Maps.