Click me
Transcribed

The Anatomy of a DDoS Attack

7000 THE ANATOMY OF A DDOS ATTACK A distributed denial-of-service (DDOS) attack is a constantly evolving menace that threatens online businesses with downed websites, financial losses, and damaged client relationships. Whether you knew it or not, you've been a witness to such attacks-and possibly even a victim, as many Web-enabled devices become accessories to cybercrime without owners ever knowing. Sells services THE CYBER THE ARMS CRIMINALS DEALER MO(DDOS) OPERANDI In order to protect yourself from DDOS attacks, you need to understand the underlying ecosystem and your organization's place in it. Attacks Recruits targets botnet THE VICTIMS THE VICTIMS A typical DDOS attack is While high-profile data breaches make headlines on a practically daily basis, the truth is that anyone with a public Web presence is a potential target. executed using a botnet. Mid-Sized Small Large Corporations Corporations Businesses Political Controversial Online Entities Leaders Personalities A botnet is a group of malware- infected devices that hackers ***** can use for DDOS attacks- VOTE even as device owners browse ***** the Internet, unaware of any malicious activity. THE ARMS DEALERS Who creates the botnets, and how do they do it? Who They Are What They Do Builds user-friendly toolkits that make botnets easily accessible The Kit Maker Uses malware kits to build botnets for herders and booters The Builder The Bot Herder Controls botnets via remote command-and- control servers The Booter Sells botnets under the guise of server stressers THE CYBER CRIMINALS Who buys these weapons, and why might they attack you? The Hacktivist The Intimidator The Harasser To express criticism to politicians, To suppress free speech and political discussions To bully online users governments, or controversial persons or organizations The Extortionist The Hired Gun The Script Kiddie To make a living For the money (Pro tip: Don't give it to them.) For the thrill of it or to brag to their peers CYBERCRIME AND THE BOTTOM LINE According to a 2015 Ponemon study, DDOS attacks are the #1 type of cyberattack on large corporations-and are more costly than you might think. 1.9 attacks Average number of successful cyberattacks per company each week IIII 51% of companies have experienced a DDOS attack. 35% of cyberattack culprits are malicious insiders: employees, contractors, or business partners. THE COST OF UNLAWFUL ENTRY The average cost to resolve a DD0S attack is $408,292. $21,155 Average cost of a cyberattack, per day 19.3 days Average time to resolve a DDOS attack 70% What's worse, DDOS attacks impact entire organizations, not just IT departments. of DDOS attack victims are targeted Areas Most Financially Impacted by a DDOS Attack more than once, according to a 2014 Incapsula survey. 35% 23% 22% 12% 5% 2% 1% IT Sales Security Customer Public Legal Other Service Relations THE UNSEEN COSTS DDOS attacks can have long-term consequences beyond the financial impact. It can take years for companies to recover, both financially and in terms of lost trust. Consequences of a Cyberattack • 39% Had to replace hardware or software Business disruption 52% Found malware installed on their network • 35% 50% Information loss Experienced loss of customer trust • 21% 43% Revenue loss Acknowledged theft of customer data 33% • 5% Other Suffered intellectual property loss 19% DDOS attacks come in many shapes and sizes and are nearly impossible to prevent on your own. Learn more about protecting yourself from DD0S attacks at incapsula.com/ddos. SOURCES "2015 Cost of Cyber Crime Study: Global," Hewlett Packard Enterprise/Ponemon Institute "What DDOS Attacks Really Cost Businesses," 2014, Incapsula IMPERVA facebook.com/Incapsula twitter.com/Incapsula_com INCAPSULA く …… .......

The Anatomy of a DDoS Attack

shared by biancagorospe on Feb 22
47 views
1 shares
0 comments
On average, it takes 19.3 days and a cost of $21,155 per day to resolve a DDoS attack. View our infographic to learn about the victims, attackers, modus operandi and impacts of DDoS attacks.

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size