This attack, which happened in multiple waves, made it so many websites were inaccessible. Sites such as Twitter, SoundCloud, Spotify, Shopi, fyBox, Boston Globe, New York Times, Github, Airbnb, Reddit, Freshbooks, Heroku and Vox Media properties (Conger, 2016).
Just what exactly is a DDoS attack and how can it bring down so many sites? A DDoS attack is where there is an attempt bring down a website or online service by flooding and overwhelming it with traffic from multiple sources (understanding-ddos, 2013). In the attack that happened to Dyn there were tens of millions of IP addresses hitting the servers at the same time (Turton, 2016). A DNS server is a server that stores a database of domain names, such as www.lds.org, and maps them to a public IP address. This makes it so instead of having to know the IP address of a website you can just access it by typing in the domain name. When the DDoS attack was happening, those tens of millions of IP addresses were taking all the resources and processing power of the DNS server so it couldn’t keep up with all the requests. Thus making it impossible for you to reach your desired …show more content…
If you want to work in the information technology industry then there is one thing that you must do, never stop learning. Getting a degree is a good start and will arm you with the essentials and a solid foundation. On top of getting an education, experience and obtaining certifications will help you to be able to stay on top of the game and allow you to properly protect your site. There are a number of security certifications that you can get. According to Ed Tittel, from tomsitpro.com, the best information security certificates that you can get for 2016 are: CompTIA Security +, CEH: Certified Ethical Hacker, GSEC: SANS GIAC Security Essentials, CISSP: Certified Information Systems Security Professional, and CISM: Certified Information Security Manager (Tittel, 2015). He said in the article that, “When it comes to information security, you need only read the headlines to observe that those with malicious intent constantly find new and scary ways to access and misuse privileged information for criminal, unscrupulous or questionable purposes” (Tittel, 2015). This shows and proves that to make it in the information technology you can’t stay