HC3 Threat Briefing – Distributed Denial of Service (DDoS), July 16, 2020

The attack traffic originates from many sources, not from a single one that could easily be blocked.  Frequently leverages botnets.  The attack prevents the user access or degrades the access beyond acceptable limits.  The attack could be against any layer, or combination of layers, of the systems, ranging from initial access to the system to the functionality of the application.