DDoS attacks are attempts to flood your network resources and disrupt the normal flow of traffic. Think of it as a sudden traffic jam that prevents you from reaching your destination quickly. This means regular visitors can’t visit your website.
By Ho Chin Chow, Deputy Director, Product Management, SPTel
The methodology and complexity of DDoS attacks can differ.
Unfortunately, it’s not difficult for anyone to instigate a DDoS attack. On the dark web, a DDoS attack can go for as low as a few hundreds of dollars for a 24-hour attack.
It’s also not easy to trace the perpetrator behind a DDoS attack. DDoS makes use of computer systems that have been infected by malware to launch attacks. This can include computers and Internet of Things (IoT) devices. Since these are legitimate devices that have been infected, it can be difficult to differentiate normal traffic from traffic sent from compromised devices.
Read on to learn more about DDoS attacks, their impact to businesses and how you can better defend against such threats.
About the Author
Ho Chin Chow is the Deputy Director of Product Management in SPTel and Product Owner of SPTel’s product portfolio consisting of Connectivity, Internet, SDWAN, IoT-aaS, Managed Network & Security. He is engaged in thought leadership within SPTel and leads the product track in its digitalization project. He is an accomplished product management professional with 18 years of telecommunications experience. His product knowledge spans both local and regional spheres.
Views expressed in this article are personal. The facts, opinions, and language in the article do not reflect the views of CISO MAG and CISO MAG does not assume any responsibility or liability for the same.