ITP.net’s Cyber Kung Fu Master Class: DDoS, with Help AG
Nicolai Solling of Help AG teaches us how to defend against the service-blackout menace
Businesses and individuals must feel overwhelmed at times by the alarming escalation in cyber-attacks. From denial of service assaults to insidious phishing ambushes, the Internet has descended from an uber-library into a series of foreboding dark alleys where you can easily lose your wallet... or your teeth.
But never fear. We at ITP.net invite you to our digital dojo to learn a bit of self-defence. Each month you will take to the mats, where our guest Master will dissect a specific attack and show you the techniques to effectively neutralise it.
In essence, we will teach you the noble art of Cyber Kung Fu (gong!).
After we are through you can stroll the cyber-streets with confidence, because you will know… Kung Fu (gong!).
Meet our Cyber Kung Fu Master: Nicolai Solling, director of technology services, Help AG
Solling joined Help AG Middle East in 2008 as director of technology services. In his role, he is responsible for overseeing Help AG’s Middle East professional services, support services and technical vendor management.
Since joining the company, Nicolai has grown the technical team by more than 200% and has been heavily involved in the design, deployment and operation of some of the most challenging network and security infrastructures across Enterprise customers in various industry sectors.
He has been in the IT and network industry for over 16 years. In 2000, he was selected as one of 400 graduates out of more than 10,000 applicants for the Internal Cisco Systems Graduate Programme, where he received extensive training by industry experts in the field of Networking and IT infrastructure. Upon completion of the programme, he went on to work for Cisco for the Cisco System Advanced Services as the PS Project Engineer focusing on ISPs.
The attack: DDoS
As Master Solling explains, the distributed denial of service punch can come in two forms, each of which requires a different amount of computing power to be effective. The first is the more famous, but relatively rare network-level or volumetric assault, where resources are exhausted by relentless network traffic from multiple (distributed) outside devices, typically compromised PCs that have become part of a botnet.
Continues on next page>>