DISTRIBUTED DENIAL-OF-SERVICE (DDoS) ATTACKS: AN ECONOMIC PERSPECTIVE

While network security experts disagree on when the first Distributed-Denial-of-Service (DDoS) attack occurred, it is generally conceded that the most visible series of attacks occurred in February of 2000 when Internet giants Yahoo, Amazon, eBay, E-trade and others were attacked intermittently over a period of several days. The Yankee Group estimated the total cumulative costs of these attacks at $1.2 Billion U.S. Dollars, and it was later discovered that the attacks were conducted by a 15-year old Canadian teenager using the alias “Mafiaboy”. The teenager had crafted the series of attacks using several publicly available hacker tools.

Spotlight

Jacobian Engineering Inc.

Jacobian Engineering is an information security company that provides services and products to help companies operate securely and confidently. We provide compliance management, forensics, security assessment and audit services in addition to certification and attestation for SOC/SSAE16, PCI, HIPAA, and HITRUST. Companies may outsource security and IT services in whole or in part to our 24/7 network and security operations center and certified system engineers.

OTHER WHITEPAPERS
news image

Webex App Security Cloud Collaboration Security Technical Paper

whitePaper | November 24, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. The Webex App is a client application that connects to this platform and provides a comprehensive tool for teamwork. Users can send messages, share files, make calls, and meet with different teams, all in one place. This security technical paper provides an overview of the security features of Webex App running on Windows, Mac, iOS, Android, Linux, ChromeOS, and Web.

Read More
news image

Cybersecurity for Industry

whitePaper | November 24, 2022

This white paper provides an overview of “Cybersecurity for Industry.” It describes the threats and hazards to which industrial automation systems and production plants are exposed and introduces concepts for minimizing these risks and instituting a level of protection that’s acceptable on economic as well as security grounds.

Read More
news image

Fujitsu PRIMERGY Server Security Overview

whitePaper | May 22, 2023

During the last few years server security has become a key building block for end-to-end security. We see strongly increasing cyber-attacks on server infrastructure, which results in an intense need for server security. This whitepaper presents an overview of the security features which are available for PRIMERGY server.

Read More
news image

FortiClient Data Sheet

whitePaper | July 12, 2023

FortiClient’s Fortinet Security Fabric integration provides endpoint visibility through telemetry and ensures that all Security Fabric components – FortiGate, FortiAnalyzer, EMS, managed APs, managed Switches, and FortiSandbox – have a unified view of endpoints in order to provide tracking and awareness, compliance enforcement, and reporting. Traditional virtual private network (VPN) tunnels or new, automatic ZTNA tunnels provide secure remote connectivity. Provide security and protection for endpoints when local or remote.

Read More
news image

The EU Cybersecurity Certification Scheme

whitePaper | September 28, 2022

GlobalPlatform is a technical standards organization that enables the efficient launch and management of innovative, secure-by-design digital services and devices, which deliver end-to-end security, privacy, simplicity, and convenience to users. It achieves this by providing standardized technologies and certifications that empower technology and service providers to develop, certify, deploy, and manage digital services and devices in line with their business, security, regulatory, and data protection needs.

Read More
news image

Cisco Secure Email Buyer's Guide

whitePaper | October 20, 2022

Organizations continue to face a daunting challenge. Email is simultaneously the most important business communication tool and the leading attack vector for security breaches. The ubiquitous, and casual, use of email makes it the perfect avenue to deliver threat-centric content, insert malware into corporate systems, steal data, and extort money.

Read More

Spotlight

Jacobian Engineering Inc.

Jacobian Engineering is an information security company that provides services and products to help companies operate securely and confidently. We provide compliance management, forensics, security assessment and audit services in addition to certification and attestation for SOC/SSAE16, PCI, HIPAA, and HITRUST. Companies may outsource security and IT services in whole or in part to our 24/7 network and security operations center and certified system engineers.

Events