DDoS attacks overwhelm a target with either too many connection requests or too much bandwidth. The intended result is to make the target inaccessible, although other infrastructure elements (routers, switches, load balancers, etc.) may suffer collateral damage along the path of an attack. This paper looks at how these attacks can be avoided to ensure a safe and secure system.
Adrian Schofield sheds light on tech in South Africa
Mark Chillingworth on IT leadership