Personal tools

DDOS Attacks

DukeUniversity_IMG1201
(Duke University - Cheng-Yu Chen)
 

- Overview

Distributed denial of service (DDoS) attacks remain a significant cyber threat to many organizations. These attacks are designed to overwhelm a victim’s network resources so they cannot process legitimate traffic on their network. The methodology of these attacks can vary from one to the next, and may involve varying levels of complexity.  

The ability of DDoS attacks to paralyze operations for businesses of all sizes alone make them a credible threat. However, that’s not the only reason these cyberattacks are considered highly dangerous. DDoS attacks can impact anyone and are often used as camouflage, often being started, stopped and restarted to hide other breaches in progress.

By using DDoS attacks as a distraction, attackers can distract your cybersecurity team - much like how a stage magician redirects the attention of his audience so they can’t see through the trick.

 

 

[More to come ...]

 

 

Document Actions