Our company, Akamai Technologies, through the process of stopping the targeted attacks to various well-known web sites, has accumulated data related to attack methods, the source of attacks and scale of attacks but also independent expertise in terms of defense. By sharing a part of this information, we hope that you can make use of it in the development of your own protective environment when defending against such attacks. To begin with I will explain the structure of the Akamai platform used by our company to protect various well-known web sites from vast amounts of targeted attacks on a daily basis. After that I will present the latest statistical data regarding the methods and sources of these attacks based on our observations. Subsequently I will explain the various methods and scales of past responses we made by focusing on a few security events such as incidents involving Hactivist, Operation Ababil which targeted American financial institutions from 2012 to 2013 and any other recent events if there are any. In conclusion I will provide a summary of important points that web infrastructure administrators should be aware of.