ERE Information Security Auditors
Home | Site Map | Contact Us |  Resource Center
list of IT security and compliance audit steps
ERE Differentiators from other vendors

Denial of Service (DoS) Hardening Audit

ERE device discovery audit

The purpose of the denial of service or distributed denial of service (DDoS) attack has mutated from fun to extortion.   Specific steps can be taken by executives to mitigate the damage done by an attack, including the creation of a detailed cyber-extortion response policy, implementing technical mitigation steps both within their corporate network and in cooperation with their ISPs, and by closely liaising with law enforcement on the subject.  Mitigation steps can be costly.  So is paying extortion demands.  A straightforward ROI calculation can be used to objectively determine the appropriate budget for mitigation.

Since many DoS attacks and cyber extortion demands are initiated from locations other than North America, particularly in jurisdictions that are logistically difficult with regard to cooperation,  it is a daunting task for law enforcement to find and prosecute the offenders.  Many times DoS attacks are transnational, which raises special investigatory issues, requires law enforcement coordination with foreign counterparts, and can introduce investigative delays. The bottom line is that executives need to understand they need to take primary responsibility for their own cyber extortion preparedness.


Contact Us

905 764 3246

  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit 
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature  
  White Papers and Published Articles
  Please see Ron Lepofsky’s book,
The Manager’s Guide to Web Application Security,
published by Apress Media

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

ERE network security architecture audit
Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button