• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
The Battle Against DDoS | DDoS Attack Statistics
 

The Battle Against DDoS | DDoS Attack Statistics

on

  • 407 views

DDoS attackers use millions of remotely controlled zombie or botnet computers in their fight against legitimate businesses. Their mission is to wreak havoc. Based on the damages shown in the ...

DDoS attackers use millions of remotely controlled zombie or botnet computers in their fight against legitimate businesses. Their mission is to wreak havoc. Based on the damages shown in the infographic, they are often successful.

Statistics

Views

Total Views
407
Views on SlideShare
407
Embed Views
0

Actions

Likes
0
Downloads
8
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    The Battle Against DDoS | DDoS Attack Statistics The Battle Against DDoS | DDoS Attack Statistics Document Transcript

    • THEIR METHODS: Commandeer networks of remotely controlled zombie or botnet (robot network) computers Enlist millions of zombies to relentlessly attack at the same time, making them difficult to identify Keep a low profile to stay well disguised THEIR MISSION: Wreak havoc on businesses and individuals Continue to escalate attacks Make computer resources or entire networks unavailable for intended users 2.1 $ 7 1 million THE DAMAGES: US$ million Estimated cost of 4 hours of website downtime* US 2012 estimated cost per DDoS attack on a financial services company* GET PROTECTED “THISJUSTIN” and create news headlines 27 million US$ Average financial damage for 24-hour outage* Not to mention… • Loss of customer satisfaction and brand reputation • Increased security risk due to distraction • Lower stock prices and investor confidence • Lower Google search rankings WITH PROLEXIC! * Kindervag, John. “Develop a Two-Phased DDoS Mitigation Strategy.” May 17, 2013. Forrester Research.