From the course: Threat Modeling: Denial of Service and Elevation of Privilege

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

How attackers spend your budget

How attackers spend your budget

From the course: Threat Modeling: Denial of Service and Elevation of Privilege

Start my 1-month free trial

How attackers spend your budget

- [Instructor] Systems that automatically scale to handle load are wonderful. The idea that resources are just available to you as you need them is great. And you pay for it. Wow, can you be made to pay for it. I remember talking to a friend about a design change. They'd turned off SSL for a game they ran and I was making the security case when he stopped me in my tracks by saying, "Yeah, but we got to decommission 30,000 servers." Well, okay. I thought for a second and said, "How do you decommission 30,000 servers?" He said, "We stopped paying Amazon for them." The ability to provision and deep provision servers at scale is amazing and wonderful. And sometimes it's also expensive. That leads to two types of denial of service attacks. For one, you've set and hit budget limits and you stopped getting extra scaling. For the other, you forgot to set budget limits and you're faced with a very large bill. The former is…

Contents