01.11.2023 Views

The Cyber Defense eMagazine November Edition for 2023

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

do untold damage to a company’s reputation. Gartner estimates that downtime can cost up to $5,600 per<br />

minute; meanwhile other estimates suggest that even small businesses may lose over $100,000 per<br />

hour. Un<strong>for</strong>tunately, those daunting figures do more than emphasize the importance of the internet in<br />

modern commerce—they put companies squarely in the crosshairs of malicious actors looking to launch<br />

distributed denial of service (DDoS) attacks.<br />

Modern DDoS attacks pose a triple threat.<br />

Nearly 30 years after the first known DDoS attack, whereby a perpetrator floods their victim with traffic<br />

from across the internet, it remains a favorite attack type. From the standpoint of a cybercriminal, they<br />

have a lot to offer: they can be launched from anywhere in the world; they can be automated and multivector;<br />

and increasingly, they can be crafted to behave similarly to “normal” internet traffic, thereby<br />

evading human observation and manual, or legacy, mitigation techniques. Best of all, <strong>for</strong> the attacker<br />

perhaps, is the fact that many legacy DDoS mitigation solutions can also take more than ten minutes<br />

be<strong>for</strong>e their defenses kick in. This has led attackers to engineer shorter, sub-saturating attacks that are<br />

capable of inflicting as much, if not more damage, than their larger, longer-running volumetric<br />

counterparts.<br />

Disconcertingly, malicious attackers have taken a page out of modern warfare and, increasingly, are<br />

launching carpet-bomb (also known as “spread spectrum”) DDoS attacks, which distribute themselves<br />

across a large number of targets rather than a more easily identifiable single target.<br />

This carpet-bomb technique poses a triple threat to defenders in that it’s able to evade detection by flying<br />

under the radar of legacy, per-IP analysis techniques and thresholds. This attack technique also<br />

invalidates the use of black-hole or null-route mitigation, making it even more difficult <strong>for</strong> companies to<br />

avoid collateral damage. And because they more easily overwhelm scrubbing lane capacity (where traffic<br />

is redirected to be cleansed of malicious DDoS packets), cloud service budgets are exceeded and<br />

reporting systems are overloaded.<br />

Counter the critics.<br />

IT security leaders have the unenviable responsibility of selecting exactly the right solutions to defend<br />

against a host of ever-evolving threats, and when (not if) an attack occurs, everyone’s an armchair critic.<br />

Luckily, there are several basic tenets to follow when selecting the right DDoS defense solution.<br />

Less bad isn’t good enough. <strong>The</strong> best solutions are those that do more than mitigate attacks—they<br />

prevent them entirely. Un<strong>for</strong>tunately, all too many DDoS defense solutions don’t go the extra mile to stave<br />

off attacks. Instead, they only make them “less bad” by mitigating them, meaning that organizations must<br />

still deal with downtime and lost productivity and/or revenue while they recover.<br />

Semantics matter. <strong>The</strong>re is a big difference between “always on” and “on demand.” <strong>The</strong> <strong>for</strong>mer means<br />

that your solution is always there, protecting your systems and devices against intrusions. On-demand,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2023</strong> <strong>Edition</strong> 97<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!