FCW | The Business of Federal Technology
The Business of Federal Technology
Open Menu
  • People
  • IT Modernization
  • Digital Government
  • Security
  • Acquisition
  • Workforce
  • Events
  • Resources
    • Webcasts/Whitepapers
    • Reprints
    • List Rental
    • Advertise
    • Contact

Whitepapers

The DDoS Threat Spectrum

The world is becoming increasingly connected electronically, expanding markets and reducing the inefficiencies of doing business across borders. Services can be hosted anywhere and customers can be served from anywhere. Emerging market territories often lack proper client control, however, and malware infection rates are high. When these malware clients are directed by centralized command-and-control servers, they become “botnets.” The sheer number of client machines involved in botnets provides enormous load-generation capacity that can be rented cheaply by any party with an interest in disrupting service. Today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often all at the same time.

Through DDoS attacks have been with us for decades, the scope, nature, and magnitude of the DDoS threat spectrum have evolved significantly.

Sponsored by F5 Networks

Register to access this item.

Enter your email address.

If you are a new user, select “I don’t have a password” and hit submit. You will be taken to a short registration form. 

If you are a returning user, enter your password (or click on "forgot your password").

Can't register? Check out the answers to our Frequently Asked Questions.

What is your e-mail address?

My email address is:

Do you have a password?

Forgot your password? Click here

FCW | The Business of Federal Technology
  • About Us
  • Contact Us
  • Advertise
  • Subscribe
  • Digital Edition
  • Newsletter
  • Reprints
  • List Rental
  • © 1105 Media, Inc.
  • View our Privacy Policy and Terms of Service | CA: Do Not Sell My Personal Info
  • 1105 Media