From 3afab1aa70db05fbefe26fd172ae4f4baf758377 Mon Sep 17 00:00:00 2001 From: Selva Muthu Kumaran <86711942+selvamuthukumaran1@users.noreply.github.com> Date: Tue, 28 Nov 2023 04:40:14 +0530 Subject: [PATCH] Add resource for DDOS (#4776) cyber-security-ddos-link-updated --- .../common-network-based-attacks/100-dos-vs-ddos.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/100-dos-vs-ddos.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/100-dos-vs-ddos.md index 0ef931e67..235aa192a 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/100-dos-vs-ddos.md +++ b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/100-dos-vs-ddos.md @@ -26,3 +26,5 @@ Some common methods employed in DDoS attacks include: - **Mitigation**: DoS attacks can usually be mitigated with simpler countermeasures, but DDoS attacks often require more sophisticated defense strategies due to their distributed and coordinated nature. In conclusion, both DoS and DDoS attacks aim to disrupt the availability of a target system by overwhelming its resources. However, their key differences lie in the scale and complexity of the attack, with DDoS attacks being more powerful and more challenging to defend against. It is crucial for organizations to implement robust security measures to detect and mitigate these attacks to maintain the availability and integrity of their systems. + +- [DDOS Attack](https://www.youtube.com/watch?v=PTJ6UZz1pPQ)