1 / 10

DDoS Boot Camp: Basic Training for an Increasing CyberThreat

DDoS denial of service attacks are criminal-led malicious acts. Gain an overview of these attacks and how they could affect your business or organization in this presentation.

prolexicc
Download Presentation

DDoS Boot Camp: Basic Training for an Increasing CyberThreat

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DDoS Boot Camp:Basic Training for an Increasing Cyber Threat www.prolexic.com

  2. DDoS Attacks Are Launched by Criminals, Not Teenagers www.prolexic.com Data breaches and denial of service are criminal-led, malicious acts Distributed denial of service (DDoS) attacks are the most common and destructive form of online hacking Organized cyber-attack groups launch politically-motivated attacks to cause website downtime

  3. Estimating the Cost of a DDoS Attack • Financial services companies lost an estimated US $17 million per DDoS attack in 2012, per Forrester Consulting

  4. What Is a DDoS Denial of Service Attack? • Attempt to make a computer resource unavailable to its intended users • Targeted systems include: • Websites • Email systems • VOIP (phone systems) • Network as a whole • Hackers control remote botnets (robot networks) of virus-infected computers • It is difficult to identify the perpetrator • Hacker techniques can further amplify the attack to multiply the power of huge botnet

  5. DDoS Attack Types • Not all attacks are the same • Different techniques target different network elements • For example: • Layer 3 and Layer 4 attacks target the network infrastructure with huge volumes of traffic • Layer 7 attacks target web applications. These stealthy attacks resemble legitimate traffic to overload the server

  6. Where Do DDoS Attacks Come From? • Worldwide problem • Almost every country is a source of DDoS attacks • Many DDoS attacks originate from: • Compromised servers at hosting providers that don’t clean up malware • Servers out of reach of international authorities • China is the leading source of botnet activity • The United States is the second leading source

  7. Why Do DDoS Attackers Strike? Hacktivisim and ideological and political differences Extortion and other financial motivation Competitive attacks and hate crimes by disgruntled employees or unhappy customers Hacker experimentation – novices trying to make a name for themselves Download the white paper for more details

  8. DDoS Attackers Target Many Industries • e-Commerce • Education • Energy • Finance, banking and insurance • Government and defense • Healthcare • Internet and telecom • Media and entertainment • Non-profits • Retail • Technology • Travel

  9. Download the Free White Paper • Download the white paper DDoS Boot Camp: Basic Training for an Increasing Cyber Threatat http://www.prolexic.com/bootcamp. • The white paper includes: • What is DDoS • Types of DDoS attacks and their relative popularity • Insight into hacker mindsets and motives • How different attacks target specific network weaknesses • DDoS mitigation best practices for incident response and business continuity • A case study of successful DDoS attack readiness

  10. About Prolexic Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services. Prolexic has successfully stopped DDoS attacks for more than a decade. We can stop even the largest attacks that exceed the capabilities of other DDoS mitigation service providers.

More Related