IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Denial of Service Attacks

RSS Feed   
ALSO CALLED: Distributed Denial of Service Attacks, Teardrop Attacks, Denial of Service Prevention, DOSA, Packet Monkey, Attacks, DDoS Attacks, DNS Attacks, Smurfing, Denial-of-service Attack, D o S Attacks, DoS Attacks, Smurf
DEFINITION: On the Internet, a packet monkey is someone (see cracker, hacker, and script kiddy) who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network. Packet monkeys typically use tools created and made available on the Internet by hackers. According to one writer's distinction, a packet monkey, unlike a script  … 

Denial of Service Attacks definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Denial of Service Attacks Reports
1 - 25 of 75 Matches Previous Page  |  Next Page
The Anatomy of the Mirai Botnet
sponsored by Radware
WEBCAST: This webcast provides a breakdown of the Mirai structure, components, and attack vectors. Learn about the modern variants of Mirai so that you can understand the threat and prepare your network's defense against botnets like it.
Posted: 06 Nov 2018 | Premiered: Aug 6, 2018

Radware

The Economics of DDoS Attacks: How IoT Changed the DDoS Threat Landscape
sponsored by Radware
WEBCAST: This webcast examines the rise of botnets like BrickerBot and takes a look at the characteristics that make emerging technologies like IoT easy targets for attackers. Find out how IoT and DDoS attacks are evolving alongside one another, and learn how to anticipate and defend against the most common exploits abused by IoT botnets.
Posted: 06 Nov 2018 | Premiered: May 1, 2018

Radware

How the University of Oklahoma Improved Network Security and Achieved Greater Visibility
sponsored by Big Switch Networks
WEBCAST: Find out how the University of Oklahoma replaced their legacy network packet broker (NPB) system with a cloud-based networking monitoring fabric so that they could drive visibility into their network and bolster their security posture.
Posted: 22 Oct 2018 | Premiered: Oct 22, 2018

Big Switch Networks

SSL Attacks on the Rise
sponsored by Radware
EBOOK: Better arm yourself against SSL threats by learning about the different types of encrypted attacks, leading SSL vulnerabilities, your options for SSL protection, and more.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Radware

DDoS Mitigation and SSL Attack Protection Case Study
sponsored by Radware
CASE STUDY: In this case study, find out how one financial services company tag-teamed network security by adopting an on-premise DDoS appliance and SSL attack mitigation software to overcome the increased rate of cyberattacks assailing their organization.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Radware

DDoS Network Protection: TeraGo Case Study
sponsored by Radware
CASE STUDY: Find out how one IP network provider adopted market-leading DDoS detection and mitigation to protect their own infrastructure as well as their customers across its telco, data center, and cloud hosting environments.
Posted: 20 Jun 2018 | Published: 31 Dec 2016

Radware

Mobile Encryption Provider Turns to Cloud Security Services to Secure Customers' Privacy
sponsored by Radware
CASE STUDY: When hit with a series of massive multi-vector DDoS attacks, leading encryption provider Myntex experienced severe service interruptions that negatively impacted its customers. In this case study, find out how Myntex adopted cloud security services in order to step up their protection against multi-vector threats.
Posted: 19 Jun 2018 | Published: 30 Jun 2016

Radware

DDoS Defense: EMEA Multinational Banking Group Case Study
sponsored by Radware
CASE STUDY: Find out how one EMEA-based financial services company implemented an on-premise DDoS mitigation appliance along with cloud-based services designed to combat against DDoS and other encrypted threats.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Radware

Updating Legacy Protection Measures against Encrypted Attacks
sponsored by Radware
CASE STUDY: Find out how to enable cybersecurity that scales on-demand to combat against advanced DDoS and SSL encrypted attacks.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

Radware

Choosing the Right DDoS Protection Strategy
sponsored by Radware
WHITE PAPER: Learn about all of your different DDoS security deployment options, including on-demand cloud DDoS protection services, always-on cloud services, and hybrid DDoS protection.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

Radware

Top 5 CDN Blind Spots: Vulnerabilities That Can Lead to a Business Outage
sponsored by Radware
RESOURCE: Learn about 5 cyber threats that can impact your content delivery networks (CDNs), so you can properly safeguard against them to maintain application performance and exceptional customer experience.
Posted: 05 Mar 2018 | Published: 05 Mar 2018

Radware

Top 9 DDoS Threats Your Organization Must Be Prepared For
sponsored by Radware
RESOURCE: Utilize this resource to gain a better understanding of the top 9 DDoS threats your organization should prepare for.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Radware

2017's 5 Most Dangerous DDoS Attacks & Steps to Mitigate Them
sponsored by Radware
RESOURCE: Learn the 5 most dangerous attacks in 2017 and the steps to protect your organization's network.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Radware

Focus ASEAN: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
Posted: 10 Apr 2017 | Published: 11 Apr 2017

ComputerWeekly.com

Focus ANZ: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

ComputerWeekly.com

Leading Vendors in the DDoS Mitigation Landscape
sponsored by Imperva
RESEARCH CONTENT: This Forrester Wave report identifies the leading DDoS mitigation providers and breaks down how they prevent, detect, and resolve threats. Find out how each provider measures up and see which one is best suited to help you protect your network.
Posted: 09 Aug 2018 | Published: 07 Dec 2017

Imperva

A Guide to Protecting Cryptocurrency from Web Threats and DDoS Attacks
sponsored by Imperva
WHITE PAPER: In this white paper, learn about the vulnerabilities in the emerging cryptocurrency market, and learn about the key components of cryptocurrency defense, including web application firewalls, DDoS protection, and content delivery network services.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Imperva

The Smart, Secure Cloud for India: Learn How Google Cloud Infrastructure Keeps Your Data Secure
sponsored by Google Cloud
WHITE PAPER: Google Cloud's Mumbai cloud region provides faster data transfers and reduced latency to the India region. Download the whitepaper for a look under the hood of Google's infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Google Cloud

Rethink DNS
sponsored by Oracle Dyn
EBOOK: This e-book details why you need to rethink DNS from several different perspectives, including your DNS choices, the importance of DNS for digital resilience and the overall value you place on DNS.
Posted: 11 May 2017 | Published: 30 Dec 2016

Oracle Dyn

Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF
sponsored by F5 Networks
EGUIDE: More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

Explore the Evolving DDoS Threat Landscape
sponsored by Radware
EGUIDE: Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
Posted: 20 Oct 2016 | Published: 18 Oct 2016

Radware

DDoS Attacks Are On The Rise – And Fatal to Most Businesses
sponsored by Arbor Networks
EGUIDE: This e-guide arms you with the information you need to prepare your defenses for distributed denial of service (DDoS) attacks. Learn how DDoS attacks target your security weak spots, how responses to attacks are improving, and the central challenges surrounding attack prevention.
Posted: 13 Oct 2016 | Published: 11 Oct 2016

Arbor Networks

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

Cybersecurity Lessons from 2014
sponsored by IBM
WHITE PAPER: In this special security report, discover what lessons can be learned from 2014's cyber-breaches to improve cybersecurity in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

How to Deal with Increasing DDOS Attacks
sponsored by Verisign, Inc.
EGUIDE: This expert e-guide explores how to protect your organization from distributed denial of service attacks.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Verisign, Inc.
1 - 25 of 75 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement