{"id":306,"date":"2025-06-28T17:23:39","date_gmt":"2025-06-28T17:23:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse200-chase\/?p=306"},"modified":"2025-06-28T17:23:39","modified_gmt":"2025-06-28T17:23:39","slug":"write-up-exploring-attacks-on-availability","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse200-chase\/2025\/06\/28\/write-up-exploring-attacks-on-availability\/","title":{"rendered":"Write Up: Exploring Attacks on Availability"},"content":{"rendered":"\n<p>Chase knight<br>June 21, 2025<br>                                    Exploring Attacks on Availability<br>            An attack on availability is a form of cyber assault designed to disrupt or<br>completely block legitimate users from accessing critical systems, services, or data.<br>These attacks specifically target the availability component of the CIA triad<br>Confidentiality, Integrity, and Availability a cornerstone of information security. Unlike<br>breaches aimed at data theft or manipulation, availability attacks render digital<br>resources inaccessible, leading to operational downtime, financial losses, and<br>reputational damage. Organizations heavily reliant on continuous digital services, such<br>as financial institutions, healthcare providers, and e-commerce platforms, are<br>particularly vulnerable.<br>               Distributed Denial of Service (DDoS) attacks are a common and<br>increasingly sophisticated method of disrupting availability. In a DDoS attack, a network<br>of compromised devices, often forming a botnet, overwhelms a target server or network<br>with a flood of requests or traffic, exhausting its resources and preventing normal<br>operation. A significant recent instance occurred in June 2025, when Cloudflare<br>reported mitigating a record-breaking DDoS attack. This attack peaked at 7.3 terabits<br>per second (Tbps), delivering over 37.4 terabytes of data in just 45 seconds. The<br>assault leveraged a combination of UDP floods and reflection\/amplification techniques, using spoofed IP packets directed at misconfigured servers to redirect traffic to the<br>victim (Tom\u2019s Hardware, 2025). This illustrates the scale and complexity of modern<br>DDoS attacks.<br>           The implications of such attacks are far-reaching. Organizations face<br>immediate operational disruptions, halting online services, delaying customer<br>transactions, or even shutting down critical infrastructure, as seen in past attacks on<br>airports, healthcare providers, and government systems. Financially, disruptions can<br>lead to revenue losses, increased cybersecurity expenses, and potential legal penalties,<br>especially in regulated sectors. Reputational damage from repeated failures can erode<br>customer trust. Users may experience denied access to essential services like email,<br>online banking, or healthcare portals, which can be especially detrimental during<br>emergencies. Persistent attacks on availability can undermine public confidence in<br>digital systems, prompting demands for stricter regulations and more robust defensive<br>technologies.<\/p>\n\n\n\n<p>Work cited<br>\u25cf Tom\u2019s Hardware. (2025). Massive DDoS attack delivered 37.4TB in 45 seconds.<br>https:\/\/www.tomshardware.com<br>\u25cf Wired. (2025). What Really Happened With the DDoS Attacks That Took Down<br>X. https:\/\/www.wired.com<br>\u25cf The Guardian. (2025). Pro-Russian hackers claim to have targeted several UK<br>websites. https:\/\/www.theguardian.com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chase knightJune 21, 2025 Exploring Attacks on Availability An attack on availability is a form of cyber assault designed to disrupt orcompletely block legitimate users from accessing critical systems, services, or data.These attacks specifically target the availability component of the CIA triadConfidentiality, Integrity, and Availability a cornerstone of information security. Unlikebreaches aimed at data theft&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse200-chase\/2025\/06\/28\/write-up-exploring-attacks-on-availability\/\">Read More<\/a><\/div>\n","protected":false},"author":30357,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200-chase\/wp-json\/wp\/v2\/posts\/306"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200-chase\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200-chase\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200-chase\/wp-json\/wp\/v2\/users\/30357"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200-chase\/wp-json\/wp\/v2\/comments?post=306"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse200-chase\/wp-json\/wp\/v2\/posts\/306\/revisions"}],"predecessor-version":[{"id":307,"href":"https:\/\/sites.wp.odu.edu\/cyse200-chase\/wp-json\/wp\/v2\/posts\/306\/revisions\/307"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200-chase\/wp-json\/wp\/v2\/media?parent=306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200-chase\/wp-json\/wp\/v2\/categories?post=306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200-chase\/wp-json\/wp\/v2\/tags?post=306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}