What are the effects of the attacks that caused Facebook to be degraded and a black-out on Twitter for two hours?

Authors Avatar

International Baccalaureate

Information Technology in a Global Society

Portfolio

()

What are the effects of the attacks that caused Facebook to be degraded and a black-out on Twitter for two hours?

(Politics and government)

August,, 2009

Tran Thai Bao Khanh

The British International School

Vietnam

News Item:

BBC News, 2009, Web attack blogger blames Russia,
 [August 2009]

  1. PRESENTATION OF THE ISSUE

The article “Web attack Blogger Blames Russia” on BBC website attracted my attention to an attack of an activist Georgy, whose nickname was Cyxymu, to sites such as Facebook, Twitter, and Google. However, Cyxymu claimed that he was aimed at the attack not the one that was attacking, and Russia was behind all this as the government did not want the public to know what they did to Georgian people, since the blogger just wrote the truth about the Russian-Georgian war, which started a year ago, and all the sites where he had his blogs and videos posted on were “attacked” (Twitter, Facebook, Live Journal, and Google).

The experts identified the attack as the Denial of Service (Dos), which tended to stopped all the operation of the websites that Cyxymu was trying to access. The attack had forced all the big websites to shut down or degraded, which leads to serious consequences of other users. This attack had violated the “Internet Proper Use Policy” of the IAB, additionally making inconvenience for others, causing a great loss of time and money.

Join now!

  1. THE IT BACKGROUND OF THE ISSUE

The Denial of Service (DoS) attack (the picture below) happens when the computer and network are flooded with data making the information unable to be processed. The attacker use the keyboard to try sending a lot of data to one computer that was trying to get the access to the internet as the user types the URL into the browser and clicks enter, a request is then sent to that page asking for permission to view it. For usual connection, the server verifies the request and allows the users to get ...

This is a preview of the whole essay