What is a good response to? A DoS attack is when legitimate users cannot access information systems or services because of the actions of a malicious actor who floods the targeted system with excessive traffic, rendering it unresponsive (CISA, 2021). These attacks are a danger to online retailers because they disrupt operations and lead to substantial financial and reputational damage (Crumbley & Fenton, 2021). For high-priority applications, revenue losses can reach upwards of $67,651 per hour during downtime. Employee productivity declines when critical business applications are offline, and remediation efforts incur extra costs, such as overtime pay and external consulting fees. Such disruptions can tarnish brand reputation, driving customers to competitors and causing long-term market share loss. Some attacks come with ransom demands, adding further financial strain (Sansone, 2024).

Auditing: A Risk Based-Approach (MindTap Course List)
11th Edition
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Chapter3: Internal Control Over Financial Reporting: Responsibilities Of Management And The External Auditor
Section: Chapter Questions
Problem 35CYBK
icon
Related questions
Question

What is a good response to?

A DoS attack is when legitimate users cannot access information systems or services because of the actions of a malicious actor who floods the targeted system with excessive traffic, rendering it unresponsive (CISA, 2021). These attacks are a danger to online retailers because they disrupt operations and lead to substantial financial and reputational damage (Crumbley & Fenton, 2021). For high-priority applications, revenue losses can reach upwards of $67,651 per hour during downtime. Employee productivity declines when critical business applications are offline, and remediation efforts incur extra costs, such as overtime pay and external consulting fees. Such disruptions can tarnish brand reputation, driving customers to competitors and causing long-term market share loss. Some attacks come with ransom demands, adding further financial strain (Sansone, 2024).

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Auditing: A Risk Based-Approach (MindTap Course L…
Auditing: A Risk Based-Approach (MindTap Course L…
Accounting
ISBN:
9781337619455
Author:
Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:
Cengage Learning
Pkg Acc Infor Systems MS VISIO CD
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:
9781133935940
Author:
Ulric J. Gelinas
Publisher:
CENGAGE L
Accounting Information Systems
Accounting Information Systems
Accounting
ISBN:
9781337619202
Author:
Hall, James A.
Publisher:
Cengage Learning,
Business/Professional Ethics Directors/Executives…
Business/Professional Ethics Directors/Executives…
Accounting
ISBN:
9781337485913
Author:
BROOKS
Publisher:
Cengage
Contemporary Auditing
Contemporary Auditing
Accounting
ISBN:
9781337650380
Author:
KNAPP
Publisher:
Cengage