Denial of Service


Use this content use case to create a security case for denial of service.

Content pack title

Security Incident Handling Management

Case template

Denial of service attack

Task templates

  • Confirm Vulnerability is being exploited
  • Confirm if target is business critical
  • Confirm if atta​​​​​​​cker is internal
  • Review DOS protections
  • Validate system integrity of attacked systems
  • Notify DOS protection provider and/or ISP
  • Isolate the attacking host(s)
  • Emergency patch request

Service request activity flow

The following sequence occurs when a security case for denial of service is created:

Denial of Service activity flow




 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC Helix for Security Incident Handling 25.3