{"id":46988,"date":"2025-03-17T16:36:33","date_gmt":"2025-03-17T15:36:33","guid":{"rendered":"https:\/\/www.itech-progress.com\/ddos-dauerhafte-datenflut-ohne-schutzstrategie-und-wie-man-sich-davor-schuetzen-kann\/"},"modified":"2026-04-23T11:06:43","modified_gmt":"2026-04-23T09:06:43","slug":"ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it","status":"publish","type":"post","link":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/","title":{"rendered":"<h5>DDoS: Permanent Data Flood Without a Protection Strategy \u2013 And How to Protect Against It<\/h5>"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_header title=&#8221;DDoS: Permanent Data Flood Without a Protection Strategy \u2013 And How to Protect Against It&#8221; content_max_width_tablet=&#8221;&#8221; content_max_width_phone=&#8221;100%&#8221; content_max_width_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;|600|||||||&#8221; title_text_align=&#8221;left&#8221; title_font_size=&#8221;60px&#8221; subhead_font=&#8221;|600|||||||&#8221; subhead_font_size=&#8221;30px&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;rgba(0,12,127,0.74) 0%|rgba(94,138,165,0.6) 100%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/www.itech-progress.com\/wp-content\/uploads\/2024\/07\/network-3472956_1920.jpg&#8221; height=&#8221;306px&#8221; custom_padding=&#8221;149px||340px|||&#8221; hover_enabled=&#8221;0&#8243; title_font_size_tablet=&#8221;30px&#8221; title_font_size_phone=&#8221;32px&#8221; title_font_size_last_edited=&#8221;on|desktop&#8221; subhead_font_size_tablet=&#8221;30px&#8221; subhead_font_size_phone=&#8221;20px&#8221; subhead_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;56px||6px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>The Evolving Threat Landscape of Web Applications and IT Systems<\/h2>\n<p>The threat landscape surrounding web applications and IT systems is becoming increasingly sophisticated. While traditional attacks such as SQL injections, cross-site scripting, and session hijacking remain active in 2025, they have been significantly mitigated through modern web frameworks, web application firewalls (WAF), and adherence to best practices.<\/p>\n<p>However, have you ever heard of attacks that don\u2019t aim to steal or manipulate confidential data? There are also attacks that solely focus on taking IT systems offline for as long as possible and maximizing the damage to those affected.<\/p>\n<p>In this article, we will examine one such malicious attack method, which reached a new dimension in 2013 with the traffic spikes on spamhaus.org. Five years later, GitHub experienced a DDoS attack with an astonishing data rate of 1.35 Tbps. These kinds of attacks are not isolated incidents \u2013 any company or organization could be affected tomorrow.<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;Read More&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; button_url=&#8221;https:\/\/www.isaqb.org\/blog\/ddos-permanent-flood-of-data-without-a-protection-strategy-and-how-to-protect-yourself-against-it\/&#8221; custom_button=&#8221;on&#8221; button_alignment=&#8221;center&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#FA870D&#8221; button_bg_enable_color=&#8221;on&#8221; button_border_color=&#8221;#FA870D&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Sources<\/h2>\n<ol>\n<li><a href=\"https:\/\/www.spamhaus.org\/history\/\">Spamhaus History<\/a> (accessed on 14.09.2024)<\/li>\n<li><a href=\"https:\/\/github.blog\/news-insights\/company-news\/ddos-incident-report\/\">GitHub DDoS Incident Report<\/a> (accessed on 03.09.2024)<\/li>\n<\/ol>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Evolving Threat Landscape of Web Applications and IT Systems The threat landscape surrounding web applications and IT systems is becoming increasingly sophisticated. While traditional attacks such as SQL injections, cross-site scripting, and session hijacking remain active in 2025, they have been significantly mitigated through modern web frameworks, web application firewalls (WAF), and adherence to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":39609,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[702,579,585],"tags":[],"class_list":["post-46988","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-recommended-reading","category-software-development","category-trainings-workshops"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DDoS: Permanent Data Flood Without a Protection Strategy \u2013 And How to Protect Against It | itech-progress.com<\/title>\n<meta name=\"description\" content=\"DDoS attacks explained: What permanent data floods are, the risks they pose, and how effective protection strategies work.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS: Permanent Data Flood Without a Protection Strategy \u2013 And How to Protect Against It | itech-progress.com\" \/>\n<meta property=\"og:description\" content=\"DDoS attacks explained: What permanent data floods are, the risks they pose, and how effective protection strategies work.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/\" \/>\n<meta property=\"og:site_name\" content=\"itech-progress.com\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ITech-Progress-GmbH-189935161030876\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-17T15:36:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-23T09:06:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itech-progress.com\/wp-content\/uploads\/2024\/07\/network-3472956_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1152\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ITech Progress\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ITechProgress\" \/>\n<meta name=\"twitter:site\" content=\"@ITechProgress\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITech Progress\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\\\/\"},\"author\":{\"name\":\"ITech Progress\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#\\\/schema\\\/person\\\/1ca369682b99f720e1181dcd5137e769\"},\"headline\":\"DDoS: Permanent Data Flood Without a Protection Strategy \u2013 And How to Protect Against It\",\"datePublished\":\"2025-03-17T15:36:33+00:00\",\"dateModified\":\"2026-04-23T09:06:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\\\/\"},\"wordCount\":501,\"publisher\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itech-progress.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/network-3472956_1920.jpg\",\"articleSection\":[\"Recommended reading\",\"Software development\",\"Trainings &amp; Workshops\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\\\/\",\"url\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\\\/\",\"name\":\"DDoS: Permanent Data Flood Without a Protection Strategy \u2013 And How to Protect Against It | itech-progress.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itech-progress.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/network-3472956_1920.jpg\",\"datePublished\":\"2025-03-17T15:36:33+00:00\",\"dateModified\":\"2026-04-23T09:06:43+00:00\",\"description\":\"DDoS attacks explained: What permanent data floods are, the risks they pose, and how effective protection strategies work.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.itech-progress.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/network-3472956_1920.jpg\",\"contentUrl\":\"https:\\\/\\\/www.itech-progress.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/network-3472956_1920.jpg\",\"width\":1920,\"height\":1152},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Start\",\"item\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS: Permanent Data Flood Without a Protection Strategy \u2013 And How to Protect Against It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/\",\"name\":\"itech-progress.com\",\"description\":\"IT-Consulting und zertifizierte iSAQB Softwarearchitektur Schulungen\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#organization\",\"name\":\"itech-progress.com\",\"url\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.itech-progress.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/ITech_Logo_300dpi.png\",\"contentUrl\":\"https:\\\/\\\/www.itech-progress.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/ITech_Logo_300dpi.png\",\"width\":1244,\"height\":249,\"caption\":\"itech-progress.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ITech-Progress-GmbH-189935161030876\\\/\",\"https:\\\/\\\/x.com\\\/ITechProgress\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.itech-progress.com\\\/en\\\/#\\\/schema\\\/person\\\/1ca369682b99f720e1181dcd5137e769\",\"name\":\"ITech Progress\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ebaa487414d29cc6210a9a9050e7b1744a536f0f5ff525b09489ad18cc642035?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ebaa487414d29cc6210a9a9050e7b1744a536f0f5ff525b09489ad18cc642035?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ebaa487414d29cc6210a9a9050e7b1744a536f0f5ff525b09489ad18cc642035?s=96&d=mm&r=g\",\"caption\":\"ITech Progress\"},\"sameAs\":[\"https:\\\/\\\/www.itech-progress.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS: Permanent Data Flood Without a Protection Strategy \u2013 And How to Protect Against It | itech-progress.com","description":"DDoS attacks explained: What permanent data floods are, the risks they pose, and how effective protection strategies work.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/","og_locale":"en_US","og_type":"article","og_title":"DDoS: Permanent Data Flood Without a Protection Strategy \u2013 And How to Protect Against It | itech-progress.com","og_description":"DDoS attacks explained: What permanent data floods are, the risks they pose, and how effective protection strategies work.","og_url":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/","og_site_name":"itech-progress.com","article_publisher":"https:\/\/www.facebook.com\/ITech-Progress-GmbH-189935161030876\/","article_published_time":"2025-03-17T15:36:33+00:00","article_modified_time":"2026-04-23T09:06:43+00:00","og_image":[{"width":1920,"height":1152,"url":"https:\/\/www.itech-progress.com\/wp-content\/uploads\/2024\/07\/network-3472956_1920.jpg","type":"image\/jpeg"}],"author":"ITech Progress","twitter_card":"summary_large_image","twitter_creator":"@ITechProgress","twitter_site":"@ITechProgress","twitter_misc":{"Written by":"ITech Progress","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/#article","isPartOf":{"@id":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/"},"author":{"name":"ITech Progress","@id":"https:\/\/www.itech-progress.com\/en\/#\/schema\/person\/1ca369682b99f720e1181dcd5137e769"},"headline":"DDoS: Permanent Data Flood Without a Protection Strategy \u2013 And How to Protect Against It","datePublished":"2025-03-17T15:36:33+00:00","dateModified":"2026-04-23T09:06:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/"},"wordCount":501,"publisher":{"@id":"https:\/\/www.itech-progress.com\/en\/#organization"},"image":{"@id":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itech-progress.com\/wp-content\/uploads\/2024\/07\/network-3472956_1920.jpg","articleSection":["Recommended reading","Software development","Trainings &amp; Workshops"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/","url":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/","name":"DDoS: Permanent Data Flood Without a Protection Strategy \u2013 And How to Protect Against It | itech-progress.com","isPartOf":{"@id":"https:\/\/www.itech-progress.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/#primaryimage"},"image":{"@id":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itech-progress.com\/wp-content\/uploads\/2024\/07\/network-3472956_1920.jpg","datePublished":"2025-03-17T15:36:33+00:00","dateModified":"2026-04-23T09:06:43+00:00","description":"DDoS attacks explained: What permanent data floods are, the risks they pose, and how effective protection strategies work.","breadcrumb":{"@id":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/#primaryimage","url":"https:\/\/www.itech-progress.com\/wp-content\/uploads\/2024\/07\/network-3472956_1920.jpg","contentUrl":"https:\/\/www.itech-progress.com\/wp-content\/uploads\/2024\/07\/network-3472956_1920.jpg","width":1920,"height":1152},{"@type":"BreadcrumbList","@id":"https:\/\/www.itech-progress.com\/en\/ddos-permanent-data-flood-without-a-protection-strategy-and-how-to-protect-against-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Start","item":"https:\/\/www.itech-progress.com\/en\/"},{"@type":"ListItem","position":2,"name":"DDoS: Permanent Data Flood Without a Protection Strategy \u2013 And How to Protect Against It"}]},{"@type":"WebSite","@id":"https:\/\/www.itech-progress.com\/en\/#website","url":"https:\/\/www.itech-progress.com\/en\/","name":"itech-progress.com","description":"IT-Consulting und zertifizierte iSAQB Softwarearchitektur Schulungen","publisher":{"@id":"https:\/\/www.itech-progress.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itech-progress.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itech-progress.com\/en\/#organization","name":"itech-progress.com","url":"https:\/\/www.itech-progress.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itech-progress.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.itech-progress.com\/wp-content\/uploads\/2022\/01\/ITech_Logo_300dpi.png","contentUrl":"https:\/\/www.itech-progress.com\/wp-content\/uploads\/2022\/01\/ITech_Logo_300dpi.png","width":1244,"height":249,"caption":"itech-progress.com"},"image":{"@id":"https:\/\/www.itech-progress.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ITech-Progress-GmbH-189935161030876\/","https:\/\/x.com\/ITechProgress"]},{"@type":"Person","@id":"https:\/\/www.itech-progress.com\/en\/#\/schema\/person\/1ca369682b99f720e1181dcd5137e769","name":"ITech Progress","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ebaa487414d29cc6210a9a9050e7b1744a536f0f5ff525b09489ad18cc642035?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ebaa487414d29cc6210a9a9050e7b1744a536f0f5ff525b09489ad18cc642035?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ebaa487414d29cc6210a9a9050e7b1744a536f0f5ff525b09489ad18cc642035?s=96&d=mm&r=g","caption":"ITech Progress"},"sameAs":["https:\/\/www.itech-progress.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/posts\/46988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/comments?post=46988"}],"version-history":[{"count":8,"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/posts\/46988\/revisions"}],"predecessor-version":[{"id":54513,"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/posts\/46988\/revisions\/54513"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/media\/39609"}],"wp:attachment":[{"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/media?parent=46988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/categories?post=46988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itech-progress.com\/en\/wp-json\/wp\/v2\/tags?post=46988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}