当前位置:网站首页>DDoS "fire drill" service urges companies to prepare
DDoS "fire drill" service urges companies to prepare
2022-06-30 02:07:00 【zy18165754120】
However , somehow , When it comes to enterprises IT Department hours , The idea of getting ready has disappeared —— It can be said to be one of the most risky environments at present . actually , It's near Kandahar or rebel controlled Syria . however , The idea of what to do in the event of a violation or cyber attack basically does not appear in the security plan , Most recoveries exist in pure reactionary space .
Global information assurance company NCC Group To pass through DDoS Assured Simulation service brings the concept of fire drill into IT Security area . Through it , Enterprises can face the real Distributed denial of service (DDoS) When the attack Test its response procedure .
The exercise involves using a controlled low level DDoS Attack attack customer , Let employees practice their roles and responsibilities in attack scenarios .
although NCC The group controlled the attack , But the company can check the response of employees and ensure that procedures are in place to manage the attack itself , And dialogue with affected customers and supply chains .
The company said :“ Unlike other more subtle cyber threats ,DDoS The consequences of the attack were immediate , So the organization must be prepared to respond immediately , To minimize interference .” “ The setting of fire drill service is fast and simple , To ensure that all employees are aware of the potential hazards , And know exactly what you need once the attack starts .”
in fact ,DDoS Attacks have become increasingly common …… And it's expensive .
IBM The recent discovery , stay 2012 Annual use up to 60-70gbps Data DDoS A substantial increase in traffic , This is made up of all-weather 、 Higher bandwidth Web Servers, not PC Driven : In short , Attackers are modifying their strategies to increase sophistication . Hacker activists have also chosen DDoS As their preferred weapon , and “itsnoproblembro” The off the shelf availability of the vulnerability exploitation toolkit, such as, even provides upgraded technologies for ordinary competitors .
If 3 Month pair Spamhaus The attack of There are any signs , Then the attack is bound to get bigger .IP Blacklist Services Spamhaus suffer DDoS Attack for a week . Attack traffic was rated as high as 300Gbps—— Three times higher than the previous record , Six times the typical recent attack on Bank of America .
It's not cheap to recover from it . according to Solutionary A report of , Organized in DDoS After the attack, it cost a staggering amount : Up to... Per hour 6,500 dollar .
NCC Group Technical director Paul Vlissidis Express :“ In case of any emergency , Preparation and preparation are essential , Network security is no exception .” It is not a substitute for practice .”
边栏推荐
- (4) Blender source code analysis flash window display process
- [binary tree] maximum binary tree II
- Matlab 2012a drawing line segment with arrow
- Summary of DOM
- CTF入门学习(Web方向)
- 【MySQL 05】SUSE 12 SP5 安装MySQL后第一次修改mysql密码
- 33Mysql
- Varnish foundation overview 10
- 003_ color
- [MySQL 04] sauvegarde et restauration de la base de données MySQL sous Linux en utilisant MySQL Workbench 8.0 ce
猜你喜欢

【自然语言处理】【多模态】OFA:通过简单的sequence-to-sequence学习框架统一架构、任务和模态

The (3n+1) conjecture that C language kills people without paying for their lives

Thinking carefully and fearfully: a software can be transmitted online to monitor whether employees want to "run away"

DMX configuration

Unity2D--给动画添加关键帧并绑定事件

【银河麒麟V10】【桌面】火狐浏览器设置主页不生效

8 — router

DMX的配置

Spark 离线开发框架设计与实现

ROS bridge notes (01) - APT installation, source code compilation and installation, installation dependency, and operation display
随机推荐
Is online stock trading safe? Do you need to open an account for stock trading?
If mybaits cannot query the data, it can query how to change it in the database
Implementation of a simple camera based on pyqt5
ROS Bridge 笔记(01)— apt 安装、源码编译安装、安装依赖、运行显示
Knowledge payment cannot escape the essence of "anxiety"
007_ checkbox
MySQL monitoring 1
Is it safe to open an account in Sinosteel futures?
(4) Blender source code analysis flash window display process
什么是幂等性?四种接口幂等性方案详解!
209. minimum length subarray - sliding window
Oppo mobile phone search
SCP remote copy command record
8 — router
Write this number in C
[pytorch actual combat] generate confrontation network Gan: generate cartoon character avatars
DTW learning (dynamic time warping) -- Thought and code implementation
widget使用setImageViewBitmap方法设置bug分析
Upload, use of Avatar
26.算法常用面试题