According to U.S. Department of Homeland Security, Denial of Service (DoS) attacks occur when "legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor". While DoS attacks can be difficult to qualify from regular network activity, understanding the basic technology and attack methods used in DoS attacks may help your security team reduce the effects of an attack on your network. This introductory eBook explores the basic nomenclature and concepts of DoS attacks to help security professionals come out of the dark.
What you'll learn:
- What is a DoS attack--What is it and why do bad actors use it?
- DoS vs. Distributed Denial of Service (DDoS) attacks--Key factors used in each approach
- Additional DoS elements--Including spoofed DDoS Traffic, reflective attacks, amplification, and non-volumetric attacks