Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
26 ◾  Information Security Management Handbook
Defending against DDoS Attacks
In the event of a typical DDoS attack, the victim alone cannot effectively defend itself. Cooperation
among all involved parties is necessary. Typical methods to protect against DDoS attacks focus
on effective coordinated technological solutions. ere are three major types of coordinated tech-
nological solutions: (1) improving the security of all relevant devices; (2) enhancing the user-level
traffic control; and (3) coordinating filters and tracing back methods.
Improving the Security of the Relevant Devices
Before initiating an effective DDoS attack, the attacker needs to involve enough zombie devices to
secure the ability to generate sufficient traffic. An ineffective and direc ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498