Monitoring and preventing unauthorised access to a computer network, and network-accessible end user devices.
Guidance to help organisations understand and mitigate against DoS attacks.
Understand the points in your service where resources can be overloaded or exhausted. Determine whether you, or a supplier, are responsible for each.
Ensure your service providers are ready to deal with resource exhaustion in places where they are uniquely placed to help.
Ensure your service can scale to deal with surges in concurrent sessions.
You should design your service, and plan your response to an attack, so that the service can continue to operate, albeit in a degraded fashion.