DDoS attacks are unique in the cyber risk landscape because they don’t rely on malicious downloads or network access. Rather, these cyber breaches attempt to disrupt the normal traffic of a targeted network or server. Typically, this goal is achieved through an influx of traffic, most commonly implemented by bots, or ‘zombie computers’ that work together to target different layers of a company’s network connection, leaving websites or other company resources offline.
Most often, DDoS attacks are not one-time incidents but can occur over an extended period, causing lasting damage and costs that will continue to escalate if the issue is left unchecked.
More info @ Managed DDoS Service