• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What are the effects of the attacks that caused Facebook to be degraded and a black-out on Twitter for two hours?

Extracts from this document...

Introduction

International Baccalaureate Information Technology in a Global Society Portfolio (http://news.bbc.co.uk/2/hi/technology/8190786.stm) What are the effects of the attacks that caused Facebook to be degraded and a black-out on Twitter for two hours? (Politics and government) August,, 2009 Tran Thai Bao Khanh The British International School Vietnam News Item: BBC News, 2009, Web attack blogger blames Russia, http://news.bbc.co.uk/2/hi/technology/8190786.stm [August 2009] A. PRESENTATION OF THE ISSUE The article "Web attack Blogger Blames Russia" on BBC website attracted my attention to an attack of an activist Georgy, whose nickname was Cyxymu, to sites such as Facebook, Twitter, and Google. However, Cyxymu claimed that he was aimed at the attack not the one that was attacking, and Russia was behind all this as the government did not want the public to know what they did to Georgian people, since the blogger just wrote the truth about the Russian-Georgian war, which started a year ago, and all the sites where he had his blogs and videos posted on were "attacked" (Twitter, Facebook, Live Journal, and Google). ...read more.

Middle

For usual connection, the server verifies the request and allows the users to get the access, however, in case of DoS, the monitor sending the request will be controlled by the attackers who try to "flood" the server with a lot of "requests" making it not being able to process them. DoS attacks can only happen when there is internet connection. According to Brandee Barker, no user data was damaged or lost. In conclusion, the whole purpose of attacker carrying out DoS attacks to Facebook and Twitter was to prevent Cyxymu getting on the website, as usually, the no damages were caused. C. THE IMPACT OF THE ISSUE Denial-of-Service attacks only benefit the attackers. According to this article, if the attacker was really the Russia Government, by applying the DoS attacks to those websites that Cyxymu was trying to get on, stopped and prevented the access of the blogger to the blogs so that he could not continue his "offended" blog about Russia in order to protect its reputation. ...read more.

Conclusion

D. A SOLUTION TO A PROBLEM ARISING FROM THE ISSUE Facebook and Twitter should have automatic back-up as the safety barrier, and if the attacks happen, websites should put the announcement, like what Twitter did, on their homepage since they cannot log into the sites. By doing that, the owners of the websites let users know what is going and they will be calmer and at ease. Installment and maintaining anti-virus software and firewall are also ways to prevent Denial of Service attack as well as setting up a filter, which will lock the data before it reaches the server, then it will check for errors by detecting the patterns contained in the data. In addition, firewalls can allow and deny protocols, effectively stop users from getting simple flooding type attacks. Denial-of-Service attacks also violate regulations within some countries, for example, in the United Kingdom, there has been the "Police and Justice Act 2006" to restrict the Denial-of Service attacks, and the penalty for violation is 10 years in prison. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    You'll be sure to avoid any impulse buys--resist the urge to click on a product you do not need by distracting yourself for a moment with the remainder of the list items--and will not have to deal with the children bickering or throwing items in the cart.

  2. The use of Twitter in the 3.11 Earthquake Tsunami Disaster

    This was one of the ways families and relatives and even friends in the overseas made sure they were safe and were not in danger. My experience explained earlier was one of them, how my friends and me contacted and kept safe.

  1. ITGS portfolio Extension

    The popularity of this technology is increasing day by day and airports, hotels, restaurants are offering free Wi-Fi to attract customers and slowly Wi-Fi is replacing local area networks which require wires for connection to the internet. 5) What kind of security loopholes is a Wi-Fi network open to?

  2. To what Extent Does Government Know What is Best for its Subjects? (Stimulus: Antigone)

    - even for an authority figure such as Creon - to acknowledge that government is corrigible. This tendency is not exclusively fictional. Often in the real world, states presuppose that they know what is best for its subjects and consequently enact (allegedly)

  1. Information Technology in a Global Society - Is integrity a difficulty when students use ...

    Those within earshot will be regaled with a pious tirade on declining intellectual standards, the implication being that our fearless one-person crusader will single-handedly rescue Western thought from imminent collapse. If you're skeptical of such pronouncements, you should be. It doesn't matter whether we think students should or shouldn't use Web sources such as Wikipedia; they will.

  2. Internet and computer safety

    access to, this allowed him to attract vunerable girls easily and lure them. He was able to target girls with something they were interested in which allowed him to gain a wide range of younger girls, and also he was allowed to gain access to under 18 chat rooms, he

  1. According to the standards within the Ln Yu, has the Confucian gentleman survived to ...

    the Categorical Imperative: act as if the maxim (general rule by which you act) could be willed to become a universal law; the belief that what is right for one person is also right fore everyone in similar circumstances. It is then applicable with good will backing the formula.

  2. A comparison and analysis of the speed and efficiency between Microsofts Windows XP and ...

    take place before the system is ready for the user to use. In a computer system, the processes that take place during startup or boot-up are essential for a healthy computer. In Windows XP, the first steps of boot up are initialized by the BIOS (Basic Input/Output System).

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work