{"id":308004,"date":"2025-01-23T14:09:50","date_gmt":"2025-01-23T13:09:50","guid":{"rendered":"https:\/\/glosarix.com\/glossary\/under-protection-en\/"},"modified":"2025-01-23T14:09:50","modified_gmt":"2025-01-23T13:09:50","slug":"under-protection-en","status":"publish","type":"glossary","link":"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/","title":{"rendered":"Under-Protection"},"content":{"rendered":"<p>Description: Under Protection refers to a state in which a computer system, network, or online service lacks adequate defenses to withstand Distributed Denial of Service (DDoS) attacks. These attacks aim to saturate a system&#8217;s resources, making it inaccessible to legitimate users. In this context, &#8216;under protection&#8217; implies that the system is vulnerable and can easily become a target for malicious attacks. The main characteristics of this state include the absence of robust security measures, such as firewalls, intrusion detection systems, and specific DDoS mitigation solutions. The relevance of being &#8216;under protection&#8217; lies in the increasing number of DDoS attacks affecting businesses and organizations, which can result in significant economic losses, damage to reputation, and disruption of critical services. Therefore, it is essential for organizations to assess their level of protection and take proactive measures to strengthen their defenses against these attacks, thereby ensuring the continuity of their operations and the trust of their users.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description: Under Protection refers to a state in which a computer system, network, or online service lacks adequate defenses to withstand Distributed Denial of Service (DDoS) attacks. These attacks aim to saturate a system&#8217;s resources, making it inaccessible to legitimate users. In this context, &#8216;under protection&#8217; implies that the system is vulnerable and can easily [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"glossary-categories":[],"glossary-tags":[],"glossary-languages":[],"class_list":["post-308004","glossary","type-glossary","status-publish","hentry"],"post_title":"Under-Protection ","post_content":"Description: Under Protection refers to a state in which a computer system, network, or online service lacks adequate defenses to withstand Distributed Denial of Service (DDoS) attacks. These attacks aim to saturate a system's resources, making it inaccessible to legitimate users. In this context, 'under protection' implies that the system is vulnerable and can easily become a target for malicious attacks. The main characteristics of this state include the absence of robust security measures, such as firewalls, intrusion detection systems, and specific DDoS mitigation solutions. The relevance of being 'under protection' lies in the increasing number of DDoS attacks affecting businesses and organizations, which can result in significant economic losses, damage to reputation, and disruption of critical services. Therefore, it is essential for organizations to assess their level of protection and take proactive measures to strengthen their defenses against these attacks, thereby ensuring the continuity of their operations and the trust of their users.","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Under-Protection - Glosarix<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Under-Protection - Glosarix\" \/>\n<meta property=\"og:description\" content=\"Description: Under Protection refers to a state in which a computer system, network, or online service lacks adequate defenses to withstand Distributed Denial of Service (DDoS) attacks. These attacks aim to saturate a system&#8217;s resources, making it inaccessible to legitimate users. In this context, &#8216;under protection&#8217; implies that the system is vulnerable and can easily [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/\" \/>\n<meta property=\"og:site_name\" content=\"Glosarix\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@GlosarixOficial\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/\",\"url\":\"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/\",\"name\":\"Under-Protection - Glosarix\",\"isPartOf\":{\"@id\":\"https:\/\/glosarix.com\/en\/#website\"},\"datePublished\":\"2025-01-23T13:09:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/glosarix.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Under-Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/glosarix.com\/en\/#website\",\"url\":\"https:\/\/glosarix.com\/en\/\",\"name\":\"Glosarix\",\"description\":\"T\u00e9rminos tecnol\u00f3gicos - Glosarix\",\"publisher\":{\"@id\":\"https:\/\/glosarix.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/glosarix.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/glosarix.com\/en\/#organization\",\"name\":\"Glosarix\",\"url\":\"https:\/\/glosarix.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp\",\"contentUrl\":\"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp\",\"width\":192,\"height\":192,\"caption\":\"Glosarix\"},\"image\":{\"@id\":\"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/GlosarixOficial\",\"https:\/\/www.instagram.com\/glosarixoficial\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Under-Protection - Glosarix","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/","og_locale":"en_US","og_type":"article","og_title":"Under-Protection - Glosarix","og_description":"Description: Under Protection refers to a state in which a computer system, network, or online service lacks adequate defenses to withstand Distributed Denial of Service (DDoS) attacks. These attacks aim to saturate a system&#8217;s resources, making it inaccessible to legitimate users. In this context, &#8216;under protection&#8217; implies that the system is vulnerable and can easily [&hellip;]","og_url":"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/","og_site_name":"Glosarix","twitter_card":"summary_large_image","twitter_site":"@GlosarixOficial","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/","url":"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/","name":"Under-Protection - Glosarix","isPartOf":{"@id":"https:\/\/glosarix.com\/en\/#website"},"datePublished":"2025-01-23T13:09:50+00:00","breadcrumb":{"@id":"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/glosarix.com\/en\/glossary\/under-protection-en\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/glosarix.com\/en\/"},{"@type":"ListItem","position":2,"name":"Under-Protection"}]},{"@type":"WebSite","@id":"https:\/\/glosarix.com\/en\/#website","url":"https:\/\/glosarix.com\/en\/","name":"Glosarix","description":"T\u00e9rminos tecnol\u00f3gicos - Glosarix","publisher":{"@id":"https:\/\/glosarix.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/glosarix.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/glosarix.com\/en\/#organization","name":"Glosarix","url":"https:\/\/glosarix.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp","contentUrl":"https:\/\/glosarix.com\/wp-content\/uploads\/2025\/04\/Glosarix-logo-192x192-1.png.webp","width":192,"height":192,"caption":"Glosarix"},"image":{"@id":"https:\/\/glosarix.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/GlosarixOficial","https:\/\/www.instagram.com\/glosarixoficial\/"]}]}},"_links":{"self":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary\/308004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/comments?post=308004"}],"version-history":[{"count":0,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary\/308004\/revisions"}],"wp:attachment":[{"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/media?parent=308004"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-categories?post=308004"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-tags?post=308004"},{"taxonomy":"glossary-languages","embeddable":true,"href":"https:\/\/glosarix.com\/en\/wp-json\/wp\/v2\/glossary-languages?post=308004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}