Take for instance the view counter on Youtube, the creators are paid based on the number of views. This is the same for other software development companies who get paid for every time a person comes to their website. Although, attackers such as Anonymous, use software like “Low Orbit Ion Cannon” to spoof legitimate traffic intentionally to take down company servers. This act is keyed as “ddosing,” which is the practice of taking down larger servers through botnets or compromising system resources to lock up the actual system. Ddosing comes in two different fashions, the first being that it exploits a system resource, causing the system to hang. The second is when a group of nodes are channeled together to ping a server repeatedly, causing all other legitimate traffic to not be able to access the website. On average, a company will have an attempted ddos happen roughly 4 times a day, 27 times per week, 117 times per month, and about 1400 times per year. The average successful act lasts for about 90 minutes, and in just those 90 minutes, a company loses $2000 dollars per day, this equates to be about $700 thousand dollars per …show more content…
By hardening source code on company system programs, ones that ddosers look to take advantage of, companies can do a number of things to harden their software. First of which is simply developing a better system in which applications are hardened. For instance, by developing an app that doesn’t need to use the entire hard drive to access files, but rather specify a single allocated folder for the application to access, the practice of least privilege can be enforced more efficiently. For an application with the possibility to see hidden files and go into to root directories of the os’s system, can cause exploits or backdoors for hackers. This is inherently important for the groundworks for any application because hackers generally use sql injections to cause buffer overflow exceptions, which lets attackers know that one's program in vulnerable. To which, sql injections can be also a helpful tool for developers because it can be a goal to create applications that won’t be affected by such attempts, and the injection would be contained to a single folder so the rest of the system wouldn’t be