Skip to main content

Cyber and DDOS – What is it?

We saw in a recent blog from “The Professor” how cybercriminals could create a network of controlled computers to propagate a “BotNet”.   One of the malicious reasons for these powerful networks of control is so that the hacker can perform “Distributed Network Attacks” (DDA’s). We all have experienced this at some level and the outcome is not good for enterprise, corporations, or businesses of any size.  DDA’s create disruption even to our own home operations.  

A DDA is sometimes referred to as a Distributed Denial of Service or DDOS attack.  This virus or network of virus’s attacks behind the scenes to take over system resources.  A DDOS could attack switches, hubs, routers. It sometimes will flood the network backbone with nuisance transactions with the intention of sucking up all the bandwidth that might otherwise be necessary for day to day operations. DDOS can bring to a screeching halt the web sites for processing claims, or even shopping cart interfaces for the purchasing of products.  Attacking web servers so that they cannot function allows the attacker to hold the network hostage. The hacker then demands payment from business owners big and small.  There have also been reports of DDOS attacks from competitors of large corporations.

Once they bring the company or operators to their knees via the technology, end users will have no hope of realizing value from those web sites.  Any and all online services are at risk.  In the late 1990’s this type of attack was on the rise.  Today there are safety nets.   EVERY system and computer should be armed with some type of security scanner.  Most DDOS attacks can be stopped with programs that protect against them.   The security apps that you have to protect your domain servers, of course, are different from those on other systems and then the security we use on internet enabled devices differ even more.  The key is to protect EVERY network enabled device and be sure to UPDATE those apps frequently.   You know that as soon as we can combat one type of attack, the cybercriminal has already thought of or launched new ways of attacking networks and systems. 

Wait there is more…

In addition to reactively protecting your systems and networks, how much more resilient and enabled would a business be if they were to build in and arm the code in development against cyber-attacks.  How much better would it be to build rugged code, integrate testing early in the process (shift left) and to proactively prepare for security.  Many companies are integrating their functional teams with DevOps initiatives. They are looking at requirement gathering in a whole new light, and instrumenting their tooling for continuous integration and continuous delivery of SECURE resilient products and services.

Inspire and Educate:  Agile, DevOps Test Engineering, and  ITSM training and Certification

Comments

Popular posts from this blog

Four Service Characteristics

Recently I came across several articles by researchers and experts that laid out definitions and characteristics of services. ITIL provides us with a definition that can help drive the creation of value-laden services: A means of delivering value to customers by facilitating outcomes customers want to achieve without the ownership of specific costs and risks. An area that ITIL is not so clear is in terms of service characteristics. Several researchers and experts put forth that services have four basic characteristics (IHIP): Intangibility—Services are the results of actions not things. They have no physical presence and represent a logical set of elements. One way to think of service is “work done for others.”  Heterogeneity—Also known as “variability”; services are unique items because of the mechanisms used to deliver services, which is people. Because the people element adds variability, the service is variable. This holds true, especially for the value proposition—not eve...

What Is A Service Offering?

The ITIL 4 Best Practice Guidance defines a “Service Offering” as a description of one or more services designed to address the needs of a target customer or group.   As a service provider, we can’t stop there!   We must know what the contracts of our service offering are and be able to put them into context as required by the customer.     Let’s explore the three elements that comprise a Service Offering. A “Service Offering” may include:     Goods, Access to Resources, and Service Actions 1. Goods – When we think of “Goods” within a service offering these are the items where ownership is transferred to the consumer and the consumer takes responsibility for the future use of these goods.   Example of goods that are being provided in the offering – If this is a hotel service then toiletries or chocolates are yours to take with you.   You the consumer own these and they are yours to take with you.      ...

What is the difference between Process Owner, Process Manager and Process Practitioner?

This article was originally published in 2015. With the Introduction of ITIL 4, some of this best practice has changed. See  ITIL 4 and the Evolving Role of Roles . Updated Definitions in ITIL 4: Process Owner: In ITIL 4, the concept of 'processes' has expanded into broader 'practices.' Consequently, the Process Owner is now often referred to as the 'Practice Owner.' This individual is accountable for the overall design, performance, integration, and improvement of a specific practice within the organization. They ensure that the practice achieves its intended outcomes and aligns with the organization's objectives. Process Manager: Now commonly known as the 'Practice Manager' in ITIL 4, this role is responsible for the day-to-day management of the practice. The Practice Manager ensures that activities are carried out as intended, manages resources assigned to the practice, and oversees the practitioners performing the work. Process Practit...