Top Five Recommendations for Mitigating the Effects of DDoS Attacks - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Top Five Recommendations for Mitigating the Effects of DDoS Attacks-4 Next

The Internet Domain Name System (DNS) is a distributed naming system that enables us to access the Internet by using recognizable and easy-to-remember names such as rather than numeric IP addresses (e.g. on which network infrastructure relies to route messages from one computer to another. Since DNS is distributed, many organizations use and maintain their own DNS servers to make their systems visible on the Internet.

These servers are often targeted by DDoS attacks; if the attacker can disrupt DNS operations, all of the victims’ services may disappear from the Internet, causing the desired Denial of Service effect.

According to Corero Network Security (CNS: LN), a leader in on-premises Distributed Denial of Service (DDoS) Defense Systems for enterprises, data centers and hosting providers, for all the pain and suffering DDoS attacks have caused, there are a number of best practices that companies can implement to reduce their risk. The most effective defense against DDoS attacks requires expert preparation of defensive resources, ongoing vigilance and a rapid, organized response.

“The cat-and-mouse game between IT administrators, criminals and hacktivists has intensified in 2011 as the number of application-layer DDoS attacks has exploded. Coupled with an increase in political and ideological hacktivism, companies have to be extremely diligent in identifying and combating attempts to disable their websites, steal proprietary information and to deface their Web applications, ” said Mike Paquette, chief strategy officer, Corero Network Security.

This slideshow features Corero’s top five recommendations for mitigating the effects of DDoS attacks.

More Slideshows:

How to Make a Great Impression in Your First 90 Days Start your new job off right with these tips.

The Secret Rules of Business Success (or Failure) Rules that define the differences between a company that is doing well and one that is failing.

Seven Tips to Attain Purpose and Happiness in Life and WorkIt may simply be a question of "when" not "if" a range of mobile computing devices displaces the PC.


Related Topics : Network Security, Unified Threat Management

More Slideshows

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Security118-190x128 5 Essential Incident Response Checklists

When a security breach occurs, IT teams that are armed with incident response checklists will be better prepared to execute a fast and effective response. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.