Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

What is a DDoS attack?

Truth in IT
03/25/2024
50
1 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett: People have heard about DDoS. But what? What is DDoS if I if I'm running a corporate website, what is DDoS to me? Omer Yoachimik: It is. Well, let's start first with what it tries maybe to achieve. Um, the mechanism, the mechanics of it can vary, but the goal of it is to take your website offline or to disrupt the services so much that, uh, it's disrupting your business. Uh, so, uh, you know, for a lot of websites and services, even a minute of downtime can mean, um, a lot of lost revenue, churn users. Um, and then, you know, reputation and, uh, impact and negative impact to reputation and users going on, um, on ICS, the, you know, the formerly known as Twitter to rant about not being able to access the games that they love and so on. So that's kind of the goal of that of that cyber attack type. And the way to do it is, um, well, basically the flood your servers with more traffic than you can handle. Um, think of it like a traffic jam. Um, but that's kind of a very simplistic or one type of attack type. There's a lot of different various ways to kind of achieve that. Um, some are more sophisticated, some less.
  1. A DDoS (Distributed Denial of Service) attack aims to take a corporate website offline or severely disrupt its normal operations. By overwhelming the company's servers with excessive traffic, the attack can cause significant revenue loss, customer dissatisfaction, and reputational damage. The methods of executing a DDoS attack vary in complexity, but the common objective is to create a service outage akin to a traffic jam on a network.
Categories:
  • » Cybersecurity » Backup & Recovery
  • » Cybersecurity
  • » Cloud
  • » Data Management » Converged Infrastructure
Channels:
  • Prevent Botnets, DDoS and other Cyber-Vandalism with Cloudflare
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • cloudflare
  • ddos
  • security
  • networking
  • cloud
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: What is a DDoS attack?

            Upcoming Spotlight Events

            • Jul
              16

              How Privileged Access Really Works in Modern Windows Environments

              07/16/202501:00 PM ET
              • Jul
                29

                QR Codes Exposed: From Convenience to Cybersecurity Nightmare

                07/29/202501:00 PM ET
                More events

                Upcoming 360 View Events

                • Jul
                  24

                  360View: API Security & the Expanding Attack Surface

                  07/24/202512:00 PM ET
                  • Aug
                    21

                    360View: HCI, Cloud, and Virtualization: What’s Next?

                    08/21/202512:00 PM ET
                    • Sep
                      25

                      360View: Email Security & Social Engineering Defense

                      09/25/202512:00 PM ET
                      More events

                      Upcoming Industry Events

                      • Jul
                        23

                        Enhancing API Security Testing: Identifying Vulnerabilities Ahead of Deployment

                        07/23/202501:00 PM ET
                        More events

                        Recent Industry Events

                        • Jul
                          10

                          Discover the Latest Features of Netwrix 1Secure for MSPs

                          07/10/202501:00 PM ET
                          • Jun
                            26

                            Discover Wallarm's Innovative Approach to Safeguarding Modern APIs and Agentic AI

                            06/26/202501:00 PM ET
                            • Jun
                              25

                              Adapting to Emerging Threats: Strategies for Detection, Response, and Resilience

                              06/25/202501:00 PM ET
                              More events
                              Truth in IT
                              • Advertise
                              • About Us
                              • Terms of Service
                              • Privacy Policy
                              • Contact Us
                              • Be Our Guest
                              • Preference Management
                              Desktop version
                              Standard version