Here are three of them, at least one of which addresses another intersecting IT trend, remote users and BYOD. Another is launching your PR plan for a DDOS attack, which means you need to have considered your public relations response in advance...
"1. Verify that there is an attack – Rule out common causes of an outage, such as DNS misconfiguration, upstream routing issues and human error.
4. Protect remote users – Keep your business running: Whitelist the IP addresses of trusted remote users that require access and mainlist this list. Populate the list throughout the network and with service providers as needed
7. Mitigate application layer attacks – Identify the malicious traffic and whether it's generated by a known attack tool. Specific application-layer attacks can be mitigated on a case-by-case basis with distinct countermeasures, which may be provided by your existing solutions:"
What is DDOS? It stands for Distributed Denial of Service. It's one of the most important and common cyber attacks -- the attacker overloads or "floods" the target Web site with thousands of requests at the same time to shut it down. To learn about the DDOS program, DDOS protect options and how to stop DDOS attacks, read below.
Monday, June 16, 2014
Top 10 Steps to Mitigate a DDOS Attack: SC Magazine
Posted by Orcinus Media at 6:17 PM
Subscribe to: Post Comments (Atom)
Post a Comment