Add resource for DDOS (#4776)

cyber-security-ddos-link-updated
pull/4784/head
Selva Muthu Kumaran 11 months ago committed by GitHub
parent f40585f992
commit 3afab1aa70
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
  1. 2
      src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-network-based-attacks/100-dos-vs-ddos.md

@ -26,3 +26,5 @@ Some common methods employed in DDoS attacks include:
- **Mitigation**: DoS attacks can usually be mitigated with simpler countermeasures, but DDoS attacks often require more sophisticated defense strategies due to their distributed and coordinated nature.
In conclusion, both DoS and DDoS attacks aim to disrupt the availability of a target system by overwhelming its resources. However, their key differences lie in the scale and complexity of the attack, with DDoS attacks being more powerful and more challenging to defend against. It is crucial for organizations to implement robust security measures to detect and mitigate these attacks to maintain the availability and integrity of their systems.
- [DDOS Attack](https://www.youtube.com/watch?v=PTJ6UZz1pPQ)

Loading…
Cancel
Save