Threat Analysis: Understanding and Combating DDoS Attacks

Threat Analysis: Understanding and Combating DDoS Attacks


In the confidentiality, integrity, and availability metrics of information security, also known as the CIA Triad, denial-of-service (DoS) attacks impact availability. In a broad context, the term 'denial-of-service' has a general definition covering many types of attacks. This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations. Although major DDoS attacks are a rare occurrence for most organizations, they can have devastating effects. Anyone can become a victim at any time, so it's important to implement mitigations and practice DDoS incident response plans prior to a DDoS event.

Dell SecureWorks
31 May 2011
31 May 2011
11 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor