">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Tuesday, January 19, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Tech

DDoS: what those four letters mean (and everything else you need to know)

Milcah Lukhanyu by Milcah Lukhanyu
3 years ago
in Tech
9 min read
0

Ever notice that acronyms and initialisms don’t often spell out anything good in their full forms? There is no DCBT (designated cupcake break time) or PPH (playing with puppies hour). Instead the world gets a bunch of short-form diseases, industry-specific jargon, snooze-inducing baseball statistics and, oh yeah, cyberattacks that are wreaking havoc on websites, businesses, governments and even average unsuspecting people every day.

Yes, DDoS might as well stand for very bad internet thing, because that’s essentially what it is. Here are the specifics of that very bad internet thing, as well as a primer on what else you need to know in regards to these increasingly popular attacks.

DDoS, aka distributed denial of service

Distributed denial of service, in turn, means a cyberattack that aims to overwhelm the server or network resources of a targeted website or other online service. At its most basic level, the DDoS meaning is an attack that when successful takes a website or service offline, keeping its users from using it.

DDoS attacks are a type of denial of service attack

As can be inferred from their names, both denial of service (DoS) attacks and distributed denial of service attacks seek to deny services to their legitimate users. DDoS fits into the category of DoS, but DDoS and DoS attacks have significant differences.

In DoS attacks, just a single internet connection is used to either exploit a vulnerability or exhaust server resources with bogus requests. DDoS attacks on the other hand use a botnet, which is a network of computers and other devices that cybercriminals have hijacked using malware that allows the devices to be controlled remotely. A botnet provides attackers with powerful computing resources that do the legwork of overwhelming servers of networks on victim websites or services.

READ  Icolo.Io breaks ground for its new 27,000sqft data center in Nairobi

Related posts

Mastercard, Unilever & KCB Bank to pump over $150,000 into SMEs in Kenya via their Jaza Duka program

January 18, 2021
0

Use these smart TV security tricks to protect your privacy

January 18, 2021
0
A salesman checks a customer's iPhone at a mobile phone store in New Delhi, India, July 27, 2016. REUTERS/Adnan Abidi

How To Measure How Much You Walk On Your iPhone

January 17, 2021
0

History of Binance: The Success and Failure of One of the Most Popular Cryptocurrency Exchange

January 15, 2021
0

DDoS attacks typically target either the network layer or application layer

Network layer attacks tend to be big, as they are essentially a battle between a botnet and an intended victim to see who has more bandwidth available. When successful, a network layer DDoS attack clogs the pipeline of the network, preventing access to the servers and sometimes running up big-time bandwidth bills.

Application layer attacks are more sophisticated and target the server with fake requests that use up a significant amount of server resources for processing or handling. Think of a network layer attack like running full force at a man and tackling him, and an application layer attack like tying his shoelaces together and waiting for him to trip.

The consequences of these attacks are both short-term and long-term

Regardless of which type of attack is undertaken, the consequences are much the same: users are unable to access the site or service. This results in an immediate loss of traffic or revenue, as well as a long-term loss of loyalty – often the costliest consequence of a DDoS attack.

Other possible consequences include software or hardware damage, a massive bandwidth bill from a network layer attack, and the truly terrifying prospect of a data breach that occurs while a cybersecurity team was distracted by the distributed denial of service attack.

READ  Samsung launches QLED TV Ahead of CES 2017

Attacker motivations vary widely

The reasons behind DDoS attacks range from business or personal revenge, to gaining advantage in a competitive industry like online gaming or SaaS, to using these attacks as a form of political protest, extorting easy money using DDoS ransom notes, and for plain old “fun.”

The people behind distributed denial of service attacks likewise range from brilliant hackers to script kiddies to average people with a few extra dollars they’re willing to pay to a DDoS for hire service. There’s also a wide, wide range of DDoS victims: government websites or services, media outlets, major corporations, small to medium businesses, mom and pop shops, and random websites targeted by the quick money-making scheme of DDoS ransom notes. In short, potential victims include almost every website on the internet.

The best defense is a good defense

Unfortunately for, well, almost every website on the internet, there’s no way to actually prevent DDoS attacks from being launched. It’s only possible to prevent attempted attacks from being successful, and this is something that typically requires professional DDoS protection. For most websites and businesses this means scalable, cloud-based protection that uses granular traffic inspection and has either always-on or on-demand deployment, depending on a website or business’s specific needs. For some organizations, on-demand protection is necessary to meet compliance requirements.

With the right mitigation in place, an ugly initialism like DDoS can become little more than a blip on the radar of website and business owners. An NBD, if you will; a rare good news initialism.

Readers 3,456

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Milcah Lukhanyu

Milcah Lukhanyu

Milcah Lukhanyu covers daily news briefs at TechMoran. She is the person who will probably read your press release and get the story out of it or totally trash it. Send tips to [email protected]

Related Posts

Business

Mastercard, Unilever & KCB Bank to pump over $150,000 into SMEs in Kenya via their Jaza Duka program

January 18, 2021
0
Tech

Use these smart TV security tricks to protect your privacy

January 18, 2021
0
A salesman checks a customer's iPhone at a mobile phone store in New Delhi, India, July 27, 2016. REUTERS/Adnan Abidi
Mobile

How To Measure How Much You Walk On Your iPhone

January 17, 2021
0
cryptocurrencies

History of Binance: The Success and Failure of One of the Most Popular Cryptocurrency Exchange

January 15, 2021
0
How To

How to fuliza by Safaricom guide

January 15, 2021
0
Tech

ASUS debuts new ZenBook Duo | Pro Duo, VivoBook, ExpertBook and Chromebook laptops at CES 2021

January 15, 2021
0
signal-apps
Tech

Is Signal That Different From WhatsApp? Here Are 5 Ways It May Be Different

January 15, 2021
0
Tech

Are Cheap TikTok Likes Inferior To Expensive Ones? Read Our Experts’ Discussion

January 15, 2021
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

How to move all of your WhatsApp groups and get started with Signal

January 18, 2021

How to Apply Online Single Business Permit.

January 18, 2021

What to do to check whether the signal is down

January 18, 2021

Top 5 Financial Assets to Invest In 2021 According to Experts

January 18, 2021

Mastercard, Unilever & KCB Bank to pump over $150,000 into SMEs in Kenya via their Jaza Duka program

January 18, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: