{"id":291,"date":"2025-06-26T20:39:09","date_gmt":"2025-06-26T20:39:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/codycorbin\/?p=291"},"modified":"2025-06-26T20:39:09","modified_gmt":"2025-06-26T20:39:09","slug":"elaborations-on-distributed-denial-of-service-ddos-attacks","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/codycorbin\/2025\/06\/26\/elaborations-on-distributed-denial-of-service-ddos-attacks\/","title":{"rendered":"Elaborations on Distributed Denial of Service (DDoS) Attacks"},"content":{"rendered":"\n<p><strong><u>Introduction<\/u><\/strong><\/p>\n\n\n\n<p>In this assignment I will discuss the characteristics of Distributed Denial of Service (DDoS) attacks and how they impact an organization\u2019s availability of data. DDoS attacks can disrupt an organization\u2019s availability of data by overflowing their systems. There are widespread financial and reputational consequences to an organization when its data is made unavailable to its consumers.<\/p>\n\n\n\n<p><strong><u>Characteristics<\/u><\/strong><\/p>\n\n\n\n<p>One major characteristic of DDoS attacks is in the name itself; \u201cdistributed\u201d Denial of Service attacks are sent from numerous devices that are implemented in a much larger Botnet. This makes them much harder to track and defend against since some devices could be in South America and others in Russia. DDoS attacks utilize network protocols like HTTP and TCP to flood an organization\u2019s assets such as applications or servers and consumes the organization\u2019s bandwidth, effectively cutting off access to data. Devices like laptops, mobile phones, and IoT devices are all potential vectors for an attacker to execute a DDoS attack.<\/p>\n\n\n\n<p><strong><u>Consequences<\/u><\/strong><\/p>\n\n\n\n<p>There are consequences to an organization financially and reputationally when a DDoS is executed and data availability is put down.&nbsp;\u201cThe&nbsp;<a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">IBM Cost of a Data Breach Report<\/a>&nbsp;notes that the cost of lost business due to a cyberattack averages USD 1.47 million.\u201d&nbsp;&nbsp;(Jim Holdsworth, 2025). If an organization is unable to provide data availability, not only do they lose money through the loss of transactions, but their reputation is seen as unreliable or untrustworthy since their cybersecurity team could not prevent a potential data breach or data exfiltration.<\/p>\n\n\n\n<p><strong><u>Conclusion<\/u><\/strong><\/p>\n\n\n\n<p>DDoS attacks disrupt an organization\u2019s data availability through methods like buffer overflows and cause financial and reputational damage. A DDoS attack overloads an organizations system and prevents consumers from accessing data. If data isn\u2019t being accessed, then transactions are not occurring, and money is lost. Even worse if another attack is carried out while the cybersecurity team is dealing with a DDoS attack then they will be seen as untrustworthy and lose customers.<\/p>\n\n\n\n<p>Works Cited<\/p>\n\n\n\n<p>Holdsworth, Jim, Kosinski, Matthew. (2025, May 13). <em>What is a Distributed Denial-of-Service Attack? <\/em><a href=\"http:\/\/www.ibm.com\">www.ibm.com<\/a>. <a href=\"https:\/\/www.ibm.com\/think\/topics\/ddos\">What is a Distributed Denial-of-Service (DDos) attack? | IBM<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction In this assignment I will discuss the characteristics of Distributed Denial of Service (DDoS) attacks and how they impact an organization\u2019s availability of data. DDoS attacks can disrupt an organization\u2019s availability of data by overflowing their systems. There are widespread financial and reputational consequences to an organization when its data is made unavailable to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/codycorbin\/2025\/06\/26\/elaborations-on-distributed-denial-of-service-ddos-attacks\/\">Read More<\/a><\/div>\n","protected":false},"author":30934,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/codycorbin\/wp-json\/wp\/v2\/posts\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/codycorbin\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/codycorbin\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/codycorbin\/wp-json\/wp\/v2\/users\/30934"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/codycorbin\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/codycorbin\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/codycorbin\/wp-json\/wp\/v2\/posts\/291\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/codycorbin\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/codycorbin\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/codycorbin\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}