R34 — DDoS-Extortion / Layer-7 Abuse

Stress-test DDoS-Extortion / Layer-7 Abuse in the Standard run scenario Mid-size SaaS company. Balanced challenge.
Start playing →
R34 External Severity 7 · Major Residual offset +5

Ransom-DDoS gangs (RDoS) and L7 application-floods that bypass volumetric scrubbing by mimicking real users. Prevention via WAF/DDoS provider + rate-limiting dominates; response speed determines downtime cost. Residual exists because bot-driven L7 traffic is hard to distinguish from a flash crowd.

What is DDoS-Extortion / Layer-7 Abuse?

Ransom-DDoS gangs (RDoS) and L7 application-floods that bypass volumetric scrubbing by mimicking real users. Prevention via WAF/DDoS provider + rate-limiting dominates; response speed determines downtime cost. Residual exists because bot-driven L7 traffic is hard to distinguish from a flash crowd. CISO Game tracks this as R34 in the live risk register, severity 7 (Major), category External.

How does CISO Game model DDoS-Extortion / Layer-7 Abuse?

Exposure for R34 runs from 0 to 100, recomputed live as you buy, cancel, or reassign products. How the exposure model works →

Real-world parallel

DDoS-extortion shifts DDoS from a nuisance into a ransom event — pay or stay offline. The control posture is the same as R05 but the strategic question is whether the company has a published "we don't pay extortionists" policy and the executive willingness to absorb a sustained outage to honor it.

How do security teams mitigate DDoS-Extortion / Layer-7 Abuse?

The dominant subscore levers for this risk are:

Residual offset: +5 exposure points are structural — no product fully removes them. Real-world parallels: zero-day windows, vendor monoculture, regulator unpredictability.

Which investments mitigate DDoS-Extortion / Layer-7 Abuse?

Products in CISO Game that reduce exposure to R34:

Which related risks should you also watch?

Risks with similar dominant subscores or shared category — addressing one often helps the others:

Why does DDoS-Extortion / Layer-7 Abuse matter to a CISO?

External adversarial risks like ddos-extortion / layer-7 abuse are the risks boards expect their CISO to talk about. They drive the strongest demand for detection + response capability and the strongest emotional response in the boardroom.

How can you test your mitigation strategy?

Click Play CISO Game free to see R34 appear live in your risk register and watch each purchase move the exposure number in real time. No signup required.

Stress-test DDoS-Extortion / Layer-7 Abuse in the Standard run scenario →