Everyone’s talking about DDoS: Part One

Too much of anything is a bad thing. Too much sleep, too many drinks of cola, too much bad TV… even too much time at the gym, well, it’s not good. Excessiveness is just that: surplus to what is ideal, desirable and manageable.

In the IT sector, one of the things we can all do without are distributed denial of service (DDoS) attacks. Fair game it’s superfluous to requirements in that it’s malicious, not part of anything we do, something we never thought we’d have to contend with, a mutation that threatens network security and viability. But, it’s part of life.

DDoS attacks embody the notion of digital gluttony, as its modus operandi is predicated on the idea of disproportionate traffic as a means of disrupting and immobilising systems.

Such a bane is DDoS to industry that in a study by the Ponemon Institute entitled the Impact of Cybercrime on Business Report, IT professionals ranked it as one of the preeminent menaces to security. In the US, it is listed as the number one thing that induces unease.

With news that Checkpoint Software Technologies Ltd has produced the first in a number of solutions to protect businesses from DDoS attacks – in short, the ” appliance sits in front of an organization’s perimeter gateway and cleans the traffic from DDoS attacks before it reaches the main security gateway” – we thought we would look at some discussion points in this very topical subject matter.

Let’s start with controversy at its most extreme. In the Netherlands, D66, a political party that has a modest but nevertheless significant ten seats in the Dutch House of Representatives, five in the country’s Senate and three within the European Parliament, wants DDoS legalised. Yes, you read that correctly.

In its new election manifesto, the party, which has been in existence since 1966, considers such attacks, in some cases, done in the spirit of protest, digital remonstrations, hacktivism as we understand it. Now, they’re not calling for free reign, but for it to be regulated, similar to how real-life protests are.

InfoSecurity reports that where the idea gets its credibility from is in distinction. Where DDoS attacks are carried out to merely disrupt the online services of a business, like blocking the doors to, for example, a prominent supermarket, that falls within the law.

Where such attacks go deeper, actually breaking into the servers of that business, where sensitive information can be elicited, well, so argues D66, that is a line too far. Like, perhaps, protestors heading into the supermarket and destroying products and stealing money out of a till.

It’s certainly a punch in the dark, a wild suggestion, but one that is good for debate. We often need contrary, leftfield opinions to air themselves, not because we agree with them, but because they help us come up with ideas and solutions that were previously unattainable. In true, Socratic style, we leave you with that brilliantly provocative theme to mull over in interim, as we return with part two of this feature soon.

Our accreditations & Partners

  • REC Member
  • VTC - Virtual Technology Cluster
  • RANT Events
  • Bloom Nepro
  • YPO
  • Crown Commerical Service
  • Disability Confident
  • ISO 9001
  • Armed Force Covenant
  • Cyber Essentials Plus
  • ISO 27001

Thanks

Success

Thanks

Success

Thank you for signing up to the acumin alerts.

Send CV

Send us your CV and have our recruiters match you to the ideal opportunities

Do you already have an account with us?

Log in

Want to have an account with us?

Register

Want to just send us your CV?

Upload only doc, docx, odt, pdf format file.

By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.

Password reset

If you need a reminder for your password, fill out the field below

Log in

Access your account to edit your contact details, job alerts or to upload a new CV

Thank you

Success

Thank you for successfully uploading your CV.

Acumin Alerts

Success

Thanks for registering for Acumin alerts.

Acumin Alerts

Unfortunately your CV could not be uploaded

Please make sure your CV is one of the following file types: doc, docx, odt, pdf, rtf

Acumin Spam

Unfortunately your submission has been declared spam. Please try again.

Vacancy

Success

Thank you for submitting your vacancy.

Register

Create an account to register your contact details, sign up for job alerts and upload your CV

Success

Thanks for registering for Acumin alerts. To get the most out of Acumin's service why not register with us?

Upload only doc, docx, odt, pdf format file.
- Practitioner
- Commercial

I agree to the terms and conditions and to be contacted by recruiters:

I agree to receive marketing communications relevant to my job search:

I agree to receive Jobs By Email for the following professions:
- Business Continuity Management
- Counter Fraud
- Cyber Security
- Executive Management
- Governance & Compliance
- Information Security & Risk Management
- Penetration Testing & Digital Forensics
- Sales and Marketing
- Sales Engineering
- Security Management
- Technical Security
- Information/Risk Assurance
- Identity Management
- Application Security
- Security Architecture
- Dev/Sec Ops
- DV & SC Cleared Jobs
- Programme & Project Management
- CISO/CSO

Submit a Vacancy

Use the form below to submit a vacancy