Intelligent CIO Middle East Issue 102 | Page 75

t cht lk


One of the most used attack techniques involves the domain name system , DNS protocol , which is essential to every Internet-based service and is used to translate alphabetic domain names into a set of numerical Internet protocol addresses , explains Terry Young at A10 Networks .

The world of IT security has become more sophisticated and complex ; as threats have grown exponentially , they have also become more blended , obscure , and harder to remediate . Today , most organisations have experienced some kind of attack , with many experiencing multiple attacks , and it is no longer a matter of if , but when , an attack will take place .

The growth of cybercrime-as-a-service , especially DDoS-as-a-service , has enabled criminals to buy or rent tools and services that enable them to conduct attacks without having to develop expertise themselves . Combining such tools with attractive financial incentives and a wide collection of readymade victims , it is easy to see why this is such a lucrative industry for criminals .
As more organisations rely on online applications , DNS exploits have become more common .
The cost of a network , website or service being down or unavailable can be probative . The average cost of downtime across all industries has historically been about $ 5,600 per minute , but recent studies have shown this cost has grown to about $ 9,000 per minute . For higher risk industries such as finance , government , healthcare , manufacturing , media , retail , and transportation their average cost of downtime tends to be over $ 5 million per hour .
www . intelligentcio . com INTELLIGENTCIO MIDDLE EAST 75