Denial of Service (DOS) Attack | PDSC Advice Guide

Through the likes of Social Engineering, vulnerabilities, insider threats, etc. a criminal will compromise many internet connected devices to create a Botnet. A Botnet allows a criminal to simultaneously control the devices to co-ordinate a DDOS attack.

Devices that may facilitate a Botnet include computers, printers, smart assistants, smart fridges, smart doorbells. In fact, any device connected to the internet, referred to as IOT (Internet of Things), can be used.

To prevent your devices from becoming part of a Botnet and facilitating this attack, follow our recommended best practices, which can also be found on our Advice Page.

Denial of ServiceDenial of Service (DOS) attack is a targeted attack that causes disruption to the network by overwhelming a system with requests until it can no longer cope and crashes. DOS attacks involve a single device flooding a system but this method is easily noticed and traceable.

Distributed Denial of Service (DDOS) attacks send requests from multiple devices and are far harder to detect. A DDOS is performed by combining several software applications that run automated tasks over the Internet, known as a Botnet, making it difficult to pinpoint the origin for the attack.

For advanced technical solutions that reduce the impact of DOS attacks, speak with Technical Support, your Internet Service Provider, your web provider and any other service providers you use. Nonetheless, following best practice will greatly reduce the risk and impact of an attack:
Create an Incident Response Plan and Disaster Recovery Plan

Being prepared for a DOS attack will ensure a speedy recovery. The sooner this attack is identified, the quicker you can respond and reduce the impact it has on your business.

For more detailed guidance visit the NCSC website:

Denial of Service