31.05.2021 Views

Cyber Defense eMagazine June 2021 Edition

Cyber Defense eMagazine June Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine June Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Double up on your Bandwidth<br />

Since DDoS attacks aim to overwhelm your network with fake traffic, one logical solution is to create an<br />

alternative network connection. In other words, contract with another ISP that can provide a second<br />

network connection. It is possible to work with your alternate ISP to provide its services only under certain<br />

conditions. This will help keep costs down while still protecting against attacks.<br />

Invest in Effective Solutions<br />

It isn’t enough to improve traditional security, such as patching servers or upgrading your antivirus<br />

applications. It is more effective to implement at least some of the following solutions:<br />

• Install physical DDoS mitigation devices: DDoS traffic is often quite unique. Therefore, it is<br />

somewhat difficult to properly identify. Physical devices are often very effective at protecting small<br />

businesses from DDoS attacks because they can identify unique traffic. They can also work in<br />

concert with web application firewall (WAF) implementations.<br />

• Use a web application firewall (WAF): Usually, a WAF is good at thwarting traditional Denial of<br />

Service (DoS) attacks. The primary difference between a DoS attack and a DDoS attack is that a<br />

DoS attack targets a specific resource – usually a web server. But it is possible to use a WAF to<br />

help defend against certain types of DDoS attacks.<br />

• Use cloud scrubbing services: Often called scrubbing centers, these services are inserted<br />

between the DDoS traffic and the victim network. They can then take traffic meant for a specific<br />

network and route it to a different location. This different location is often called a “sinkhole,”<br />

because it simply buries the offending traffic.<br />

• Implement a content delivery network (CDN): Also called a content distribution network, this is<br />

a group of geographically-distributed proxy servers and networks. They are designed to provide<br />

information, and even services, from your network in case your primary network goes down. Such<br />

a network can work as a single unit to provide content quickly via multiple backbone and WAN<br />

connections, thus distributing network load. The result is that if one network becomes flooded,<br />

the CDN can deliver content from another, unaffected group of networks.<br />

Create a DDoS Response Plan<br />

Aside from hardware and software measures, you and your team also need to be prepared to act in case<br />

a DDoS attack occurs. Make sure you go over each element of your infrastructure and identify weak<br />

points and vulnerabilities when it comes to DDoS activity. Prepare processes, procedures, mitigation<br />

strategies and alerting systems as part of a comprehensive DDoS response plan.<br />

Large and small organizations alike should consider establishing a DDoS response team. This team can<br />

be composed of organizational leaders, the company CEO or owner, public relations professionals and<br />

members of the IT department. Ensure that roles are clearly defined, along with escalation procedures<br />

and practical guidelines. If you manage to detect a DDoS attack before it does any damage, odds are<br />

you will be able to prevent it altogether — provided you have the technology and training to do so.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>June</strong> <strong>2021</strong> <strong>Edition</strong> 110<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!