Disclosure of the average size of the distributed attacks to disable the service in the Middle East




Disclosure of the average size of the distributed attacks to disable the service in the Middle East
Companies need to integrate solutions for distributed attacks to disable the service (DDos) and business continuity planning in order to reduce business risks.

The company “Arbor Networks” (Arbor Networks) in the eighth annual report on the security infrastructure around the world, to the difficulty of predicting the Government and private enterprise that will be targeted in denial of service attacks.

According to the company, it has topped the headlines over the past two years, regularly distributed to service attacks directed against Government and private institutions in the Middle East.

The civil unrest in the region to a cybercrime organization and increased attacks over the Internet. And still the core motivations and stimuli for attack on evolution with attacker-driven programming and ideological struggle, by using a termination site as electronic means of issuing a statement or attitude.

While these factors that provide motivation, the company indicated that it is difficult, if not impossible, to predict that the future will be targeted in the attack. Unfortunately, it is not known what company to be one of the victims of the attack.

Mahmoud Samy, head of the Middle East, Pakistan and Afghanistan, “Arbor Networks”, although this development by computer hackers, those who are attacked are not ready to face cyber attacks as much as possible or as requested.

The track “Arbor Networks for distributed attacks to disrupt the activity of service (DDos) in the Middle East by 2013, the average size of the attacks in the region is 2 376 Gbps and average duration of attack an hour and ten minutes (source: ATLAS data company Arbor Networks”). In a world of interconnected, are vital services such as e-banking and e-government services as well as mission-critical production systems of vital targets for attackers.

Sami said that enterprises need to protect themselves from the distributed attacks to disable the service (DDos) if they wish to keep their businesses on track. Requires attention to this problem and to develop business continuity plans and risk management strategies to reduce distributed attacks to disable the service (DDos).

For many CIOs, it managers, it will require a change in how to deal with these traditional practices. However, it has become a trend in scene electronic threats in the region is the driving force for companies to formalize it security, and put it in the context of planning for risk management and business continuity.

Current financial realities require that companies are integrating information security into the financial and operational planning in order to control rising costs. Comes in conjunction with the need to provide sufficient resources to meet the priorities of their own financial and regulatory as well as reputation-driven security priorities with the integration of all relevant risk factors to organizational security model. And can often abstract nature of risk management planning and business continuity that make such operations difficult for planners and it security specialists. In most cases, the business continuity plans detailed policies and procedures to maintain operations in the wake of natural disasters such as fires, floods and earthquakes. But rarely include emergency information security incidents. This is a major omission!

Consider possible security practices is important for business continuity planning, yet many have business continuity plans on this item. Often the security incidents affecting work negatively, resulting in significant operational expenses, loss of income, and the challenges of customer satisfaction, and decreased brand reputation. Protection of the continuing availability of information is one of the most important ICT practices to be implemented. It is one of the most measurable and implementation. And are relatively easy to calculate the cost of stop-time e-commerce sites and applications, customer support, and content delivery systems and reference sites for fixed assets. May be a lot of this information is already available from studies/work available on business continuity planning efforts.

Cannot overstate the threat the continuing availability of information of distributed attacks to disable the service (DDos). There is no business continuity plan is complete without taking into account the need to preserve the availability of Internet features task, even in the face of a premeditated attack. Companies can successfully detect distributed attacks to disable the service, classification and reduction through operational best practices and customized solutions to combat these attacks. In view of the scene of electronic threats in the Middle East today, network operators cannot simply ignore these attacks as part of their business continuity and risk management planning. This is a very high risk.
Related topics:

Arbor Networks
Arbor Networks
Middle East
Distributed attacks to disable service


In: Technology & Gadgets Asked By: [18450 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »

Star Points Scale

Earn points for Asking and Answering Questions!

Grey Sta Levelr [1 - 25 Grey Star Level]
Green Star Level [26 - 50 Green Star Level]
Blue Star Level [51 - 500 Blue Star Level]
Orange Star Level [501 - 5000 Orange Star Level]
Red Star Level [5001 - 25000 Red Star Level]
Black Star Level [25001+ Black Star Level]