• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What are the effects of the attacks that caused Facebook to be degraded and a black-out on Twitter for two hours?

Extracts from this document...


International Baccalaureate Information Technology in a Global Society Portfolio (http://news.bbc.co.uk/2/hi/technology/8190786.stm) What are the effects of the attacks that caused Facebook to be degraded and a black-out on Twitter for two hours? (Politics and government) August,, 2009 Tran Thai Bao Khanh The British International School Vietnam News Item: BBC News, 2009, Web attack blogger blames Russia, http://news.bbc.co.uk/2/hi/technology/8190786.stm [August 2009] A. PRESENTATION OF THE ISSUE The article "Web attack Blogger Blames Russia" on BBC website attracted my attention to an attack of an activist Georgy, whose nickname was Cyxymu, to sites such as Facebook, Twitter, and Google. However, Cyxymu claimed that he was aimed at the attack not the one that was attacking, and Russia was behind all this as the government did not want the public to know what they did to Georgian people, since the blogger just wrote the truth about the Russian-Georgian war, which started a year ago, and all the sites where he had his blogs and videos posted on were "attacked" (Twitter, Facebook, Live Journal, and Google). ...read more.


For usual connection, the server verifies the request and allows the users to get the access, however, in case of DoS, the monitor sending the request will be controlled by the attackers who try to "flood" the server with a lot of "requests" making it not being able to process them. DoS attacks can only happen when there is internet connection. According to Brandee Barker, no user data was damaged or lost. In conclusion, the whole purpose of attacker carrying out DoS attacks to Facebook and Twitter was to prevent Cyxymu getting on the website, as usually, the no damages were caused. C. THE IMPACT OF THE ISSUE Denial-of-Service attacks only benefit the attackers. According to this article, if the attacker was really the Russia Government, by applying the DoS attacks to those websites that Cyxymu was trying to get on, stopped and prevented the access of the blogger to the blogs so that he could not continue his "offended" blog about Russia in order to protect its reputation. ...read more.


D. A SOLUTION TO A PROBLEM ARISING FROM THE ISSUE Facebook and Twitter should have automatic back-up as the safety barrier, and if the attacks happen, websites should put the announcement, like what Twitter did, on their homepage since they cannot log into the sites. By doing that, the owners of the websites let users know what is going and they will be calmer and at ease. Installment and maintaining anti-virus software and firewall are also ways to prevent Denial of Service attack as well as setting up a filter, which will lock the data before it reaches the server, then it will check for errors by detecting the patterns contained in the data. In addition, firewalls can allow and deny protocols, effectively stop users from getting simple flooding type attacks. Denial-of-Service attacks also violate regulations within some countries, for example, in the United Kingdom, there has been the "Police and Justice Act 2006" to restrict the Denial-of Service attacks, and the penalty for violation is 10 years in prison. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. The use of Twitter in the 3.11 Earthquake Tsunami Disaster

    This was one of the ways families and relatives and even friends in the overseas made sure they were safe and were not in danger. My experience explained earlier was one of them, how my friends and me contacted and kept safe.

  2. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    Because many organizations and people may have access to health information there is concern about the privacy and security of health information technology tools.

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    She declined to comment on whether, like Ocado and Tesco, Amazon planned to use liveried vans to make deliveries. Founded by Jeff Bezos in 1995, Amazon started out selling books but now also offers items ranging from e-books to shoes and washing machines.

  2. Dutch politics. Political parties are aiming for the same goals. The people in it ...

    In 2020 they want 30% less fuels then in 1990. They also wants that the Netherlands get in the top five places in the European Union who uses efficient and sustainable energy. * To save energy the government also need to change their behavior.

  1. According to the standards within the Ln Yu, has the Confucian gentleman survived to ...

    The Ancient philosophers had set up their own thoughts and beliefs creating postulates that would be continued to be inherited and studied upon on the subject on virtues, and although Western and Eastern philosophy are not only geographically separated from one another, similar aspects are found.


    & the buyer has accepted the goods, the buyer cannot repudiate the contract for any breach of a condition during the performance of any later part of the contract. Hence under such circumstances a condition is treated as a warranty & the buyer may merely claim damages.

  1. ITGS portfolio Extension

    The password should be changed from time to time and It should be ensured that no hacking is taking place. If there is any problem or case of hacking it should be immediately reported to the cyber crime department. Or use high orders of encryption so that tapping into these

  2. Social Restraints and the Effects Upon Leonce Pontellier, Madame Reisz, and Adele Ratignolle in ...

    This effectively covers for Mrs. Pontellier's previously inexplicable move to the "pigeonhouse" and enhances their status in a display of wealth. In short, Mr. Pontellier is only hampered by societal constraints when his wife doesn't follow them. In these situations, which become more numerous as the novel progresses and Edna

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work