Home
Business Guide
 
simplicable technology guide   »  security   »  the 5 motives for ddos attack

The 5 Motives for DDoS Attack

        posted by , March 14, 2011

Think your website is safe from DDoS? Well, it probably isn't.

It is often difficult to establish a motive for attack — DDoS inflicts damage but seldom benefits anyone.

There are five motives for DDoS attack: revenge, competition, politics, war and cloaking. Practically any organization or individual can become a DDoS target.

DDoS prevention

Revenge

Revenge is perhaps the most common reason for DDoS attack. Current and ex-employees, angry customers .... anyone with a dispute may have motive for attack.

Hackers sometimes attack over minor disagreements.

Competition

DDoS has the ability to cripple company operations, damage reputation and devastate sales. In many cases it may directly benefit competitors.

Politics

DDoS has the potential to digitally silence political opposition and may be used by political groups and terrorists.

Even seemingly apolitical organizations can become targets. In 2010, Mastercard, PayPal and Visa became the targets of a DDoS attack after helping governments to cut off funding to Wikileaks.

War

Many governments have developed significant DDoS capabilities as a weapon of war.

Cloaking Criminal Activity

DDoS may be used as a distraction — to hide other illegal activities. In other cases, it can be used to prevent organizations from defending themselves from other types of attack (such as phishing).

Cloaking DDoS Examples (theoretical):

- A bank uses its website to warn customers of a recent series of identity thefts. The criminals respond by bring down the website with DDoS.

- Criminals bring down a bank's systems in order to cause confusion before physically robbing the bank.

- DDoS is used to bring down security systems before a break and enter.

Other Motives

Other common motives for DDoS attack include:
- pranks
- hackers interested in establishing a reputation
- tests by governments or hackers
- random attacks
- accidental attack



3 Shares Google Twitter Facebook



Related Articles



Enterprise Architecture
How to architect an organization.




What is the value of your EA project in 9 words or less?

Current state blueprints capture business, data and implementation architecture at the conceptual, logical and physical levels.

Our collection of SOA architecture resources and tools.

ITIL 2011 (v3) identifies 25 core processes. Here they are.


Recently on Simplicable


9 ITIL Implementation Challenges

posted by Anna Mar
ITIL implementation is no cakewalk. ITIL impacts your entire organization — your business, your IT department and your inflight projects.

IT Management

posted by John Spacey
Tools and strategies for IT managers.

Why Big Data is Hype (and Why It's Not)

posted by Anna Mar
Big data is an earth shaking innovation!

How to Win at Cloud

posted by Anna Mar
Which cloud strategies will fail and which will succeed?

Sitemap













about     contact     sitemap     privacy     terms of service     copyright