Page 7 - AeM_May_2017
P. 7

RESEARCH, ANALYSIS & TRENDS




      can result in existence-threatening damages          and hardware solutions that are upstream of
      for online retailers, as they have a great re-       the infrastructure. Which solution you should
      sponsibility in securing customer data. Legis-       choose depends mainly on the threat and
      lative authorities see it also that way and          your available budget. A quite cost-effective
      therefore demand from them heightened pro-           solution represents a novel ‘shared DDoS pro-
      tection.                                             tection’. In accordance with the cloud princi-
                                                           ple, several customers share a protection enti-
      Clearly, the methods of hackers are becoming         ty, which reduces the costs for the individual.
      more and more sophisticated and threats are
      steadily increasing. Irrespective of the fact that   Better safe than sorry
      security gaps in programs repeatedly reveal
      data involuntarily, such gaps (as e.g. seen in       Apparently, companies - whether big or small
      the widespread Magento shop software) might          - can fall prey to DDoS attacks or related at-
      allow the inward transfer of a harmful program       tempted extortion, therefore, shop owners
      code into obsolete versions, putting dealers at      should ensure early protection and not only
      risk. That’s why it is highly recommended to         when the blackmail has already been re-
      use professional security solutions such as          ceived. Because neither can protection be es-
      Web Application Firewalls, preferably in com-        tablished in time - usually the blackmailers
      bination with a Customer IAM solution.               give only 24 hours - nor do the aggressors
                                                           rest once they were successful with an extor-
      You could be next                                    tion.

      The "State-of-the-Internet" report by Akamai         Overall, a trend towards ever stronger and
      shows similar results, namely that cyber-            prolonged attacks is currently looming, as
      attacks are a big risk for online shops, with the    e.g.the Akamai report stated, claiming that the
      number of attacks growing and the dimension          number of attacks over 100 Gbit /s has risen
      of attacks significantly increasing. It has now      by 140%. Furthermore, many analysts as-
      become quite easy to use the so-called               sume that phenomena such as the Mirai bot-
      "darknet" cyber-attacks on web shops, espe-          net, which had captured unprotected IoT de-
      cially since cybercrime has different character-     vices as sources for DDoS attacks, will accu-
      istics - from hacking over ransomware to             mulate in the future and everybody is con-
      DDoS attacks.                                        vinced that attacks will become more complex
                                                           and often spread across multiple attack vec-
      While usually common sense is sufficient –           tors. So, try your best to stay safe and give
      such as not to open any unknown data files or        hackers like the Shadow Brokers – the group
      using no outdated software - DDoS attacks            believed to be linked to the leak of the US
      require technical aids. Although any managed         government’s cyberweapons – a hard time.
      hosting provider runs by default a basic pro-        Especially since they threatened to release
      tection in the datacenter, that's unfortunately      more hacking tools soon that are said to man-
      in general not sufficient for major attacks.         age exploiting newer computers running Win-
      Therefore, additional DDoS mitigation solu-          dows 10 or mobile devices using the Android
      tions are offered.                                   operating system. ◊
                                                                                      By Daniela La Marca
      Roughly, it can be differentiated between CDN
      -based solutions, DDoS scrubbing centers,




                                                 MediaBUZZ Pte Ltd - Independant ePublisher for Asia
   2   3   4   5   6   7   8   9   10   11   12