Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

What is a DDoS attack?

Truth in IT
03/25/2024
52
1 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett: People have heard about DDoS. But what? What is DDoS if I if I'm running a corporate website, what is DDoS to me? Omer Yoachimik: It is. Well, let's start first with what it tries maybe to achieve. Um, the mechanism, the mechanics of it can vary, but the goal of it is to take your website offline or to disrupt the services so much that, uh, it's disrupting your business. Uh, so, uh, you know, for a lot of websites and services, even a minute of downtime can mean, um, a lot of lost revenue, churn users. Um, and then, you know, reputation and, uh, impact and negative impact to reputation and users going on, um, on ICS, the, you know, the formerly known as Twitter to rant about not being able to access the games that they love and so on. So that's kind of the goal of that of that cyber attack type. And the way to do it is, um, well, basically the flood your servers with more traffic than you can handle. Um, think of it like a traffic jam. Um, but that's kind of a very simplistic or one type of attack type. There's a lot of different various ways to kind of achieve that. Um, some are more sophisticated, some less.
  1. A DDoS (Distributed Denial of Service) attack aims to take a corporate website offline or severely disrupt its normal operations. By overwhelming the company's servers with excessive traffic, the attack can cause significant revenue loss, customer dissatisfaction, and reputational damage. The methods of executing a DDoS attack vary in complexity, but the common objective is to create a service outage akin to a traffic jam on a network.
Categories:
  • » Cybersecurity Webinars » Backup & Recovery
  • » Cybersecurity Webinars
  • » Cloud Webinars
  • » Data Management » Converged Infrastructure
Channels:
  • Prevent Botnets, DDoS and other Cyber-Vandalism with Cloudflare
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • cloudflare
  • ddos
  • security
  • networking
  • cloud
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: What is a DDoS attack?

              Upcoming Webinar Calendar

              • 01/20/2026
                01:00 PM
                01/20/2026
                Beyond The Basics: Service Delivery Workflows That Close the Efficiency Gap
                https://www.truthinit.com/index.php/channel/1756/beyond-the-basics-service-delivery-workflows-that-close-the-efficiency-gap/
              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Preparing Your Cybersecurity Strategy for the Challenges of 2026
                https://www.truthinit.com/index.php/channel/1705/preparing-your-cybersecurity-strategy-for-the-challenges-of-2026/

              Upcoming Spotlight Events

              • Jan
                22

                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                01/22/202601:00 PM ET
                More events

                Recent Spotlight Events

                • Dec
                  10

                  The Next Generation of Managed Data Security Services

                  12/10/202501:00 PM ET
                  • Dec
                    02

                    The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                    12/02/202501:00 PM ET
                    • Nov
                      20

                      Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                      11/20/202501:00 PM ET
                      More events

                      Recent Industry Events

                      • Dec
                        18

                        Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                        12/18/202501:00 PM ET
                        • Dec
                          16

                          HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                          12/16/202501:00 PM ET
                          • Dec
                            11

                            Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                            12/11/202501:00 PM ET
                            More events
                            Truth in IT
                            • Sponsor
                            • About Us
                            • Terms of Service
                            • Privacy Policy
                            • Contact Us
                            • Preference Management
                            Desktop version
                            Standard version