{"id":289,"date":"2025-12-09T04:32:29","date_gmt":"2025-12-09T04:32:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kyren-moss\/?p=289"},"modified":"2025-12-09T04:32:29","modified_gmt":"2025-12-09T04:32:29","slug":"exploring-attacks-on-availability","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kyren-moss\/2025\/12\/09\/exploring-attacks-on-availability\/","title":{"rendered":"Exploring attacks on availability"},"content":{"rendered":"\n<p>Any intent to prevent users from accessing systems, networks, or data by either flooding a<br>server with traffic and or encrypting critical data, is considered an attack on availability. For<br>example the evident rise in DDoS attacks seen in 2025 where there have been a total of 27.8<br>million attacks reported, some exceeding 1 terabit per second in traffic volume. These attacks<br>overwhelm bandwidth or can stress server resources or application layers making services<br>unreachable. Another type of attack on availability is botnet flooding, this is where someone<br>uses a network of devices to overwhelm a system, server, or network that are normally busy<br>with requests. This attack can come from thousands or even millions of infected devices and is<br>very difficult for the targeted system or network to distinguish real users from fake requests. It<br>consumes all of the available bandwidth or resources within the server until it slows the system<br>down and ultimately crashes or becomes completely inaccessible. For larger corporations,<br>availability attacks can cause operational failures and faults, detrimental revenue loss and<br>reputational damage of their business following with potential loss of customer trust. For users<br>you face not being able to use most services like health records, or personal files, and risk<br>losing access to critical information. Attacks on availability are not only the most common form<br>of cybercrime but the most impactful as well, attacking larger businesses and individuals who<br>are targeted for their information, fighting against this requires both tough and up to date<br>infrastructure and proactive response planning<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Any intent to prevent users from accessing systems, networks, or data by either flooding aserver with traffic and or encrypting critical data, is considered an attack on availability. Forexample the evident rise in DDoS attacks seen in 2025 where there have been a total of 27.8million attacks reported, some exceeding 1 terabit per second in&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kyren-moss\/2025\/12\/09\/exploring-attacks-on-availability\/\">Read More<\/a><\/div>\n","protected":false},"author":31501,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kyren-moss\/wp-json\/wp\/v2\/posts\/289"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kyren-moss\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kyren-moss\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kyren-moss\/wp-json\/wp\/v2\/users\/31501"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kyren-moss\/wp-json\/wp\/v2\/comments?post=289"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kyren-moss\/wp-json\/wp\/v2\/posts\/289\/revisions"}],"predecessor-version":[{"id":290,"href":"https:\/\/sites.wp.odu.edu\/kyren-moss\/wp-json\/wp\/v2\/posts\/289\/revisions\/290"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kyren-moss\/wp-json\/wp\/v2\/media?parent=289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kyren-moss\/wp-json\/wp\/v2\/categories?post=289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kyren-moss\/wp-json\/wp\/v2\/tags?post=289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}