Manage Learn to apply best practices and optimize your operations.

The truth about distributed denial-of-service attack prevention

Can determined attackers be prevented from launching a distributed denial-of-service attack against an enterprise? In this Q&A, expert Michael Cobb discusses the reality of attack prevention and offers best practices for thwarting attacks.

FROM THE SECURITY SCHOOL:

Distributed denial-of-service attack defense

SECURITY SCHOOL SECTIONS

  1. Learning Links
  2. Take the Quiz
+ Show More

A distributed denial-of-service attack is an Internet assault in which a number of systems attack a single target, causing a denial of service for legitimate users of the targeted system.

While many technologies today are designed to prevent various types of attacks, preventing a distributed denial-of-service (DDoS) attack is impossible, and stopping one once it has started can be quite a challenge.

In this Q&A podcast, security expert Michael Cobb discusses the reality of DDoS attack prevention, why the updating of Internet protocols can help (but may never happen), security and "good neighbor" best practices, and more.

Listen in now to gain a better understanding of DDoS attacks and lessen the chance such an attack will succeed on your system.  

About the author: Michael Cobb, CISSP-ISSAP, is a renowned security author with over 20 years of experience in the IT industry. He has a passion for making IT security best practices easier to understand and achievable. He co-authored the book IIS Security and has written many technical articles for leading IT publications. Mike has also been a Microsoft Certified Database Manager and registered consultant with the CESG Listed Advisor Scheme (CLAS).

Next Steps

Learn more about integrating DDoS mitigation into a network security strategy and discover how to respond to the latest DDoS attacks.

This was last published in August 2014

PRO+

Content

Find more PRO+ content and other member only offers, here.

Security School

Distributed denial-of-service attack defense

SECURITY SCHOOL SECTIONS

  1. Learning Links
  2. Take the Quiz

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close