• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What are the effects of the attacks that caused Facebook to be degraded and a black-out on Twitter for two hours?

Extracts from this document...


International Baccalaureate Information Technology in a Global Society Portfolio (http://news.bbc.co.uk/2/hi/technology/8190786.stm) What are the effects of the attacks that caused Facebook to be degraded and a black-out on Twitter for two hours? (Politics and government) August,, 2009 Tran Thai Bao Khanh The British International School Vietnam News Item: BBC News, 2009, Web attack blogger blames Russia, http://news.bbc.co.uk/2/hi/technology/8190786.stm [August 2009] A. PRESENTATION OF THE ISSUE The article "Web attack Blogger Blames Russia" on BBC website attracted my attention to an attack of an activist Georgy, whose nickname was Cyxymu, to sites such as Facebook, Twitter, and Google. However, Cyxymu claimed that he was aimed at the attack not the one that was attacking, and Russia was behind all this as the government did not want the public to know what they did to Georgian people, since the blogger just wrote the truth about the Russian-Georgian war, which started a year ago, and all the sites where he had his blogs and videos posted on were "attacked" (Twitter, Facebook, Live Journal, and Google). ...read more.


For usual connection, the server verifies the request and allows the users to get the access, however, in case of DoS, the monitor sending the request will be controlled by the attackers who try to "flood" the server with a lot of "requests" making it not being able to process them. DoS attacks can only happen when there is internet connection. According to Brandee Barker, no user data was damaged or lost. In conclusion, the whole purpose of attacker carrying out DoS attacks to Facebook and Twitter was to prevent Cyxymu getting on the website, as usually, the no damages were caused. C. THE IMPACT OF THE ISSUE Denial-of-Service attacks only benefit the attackers. According to this article, if the attacker was really the Russia Government, by applying the DoS attacks to those websites that Cyxymu was trying to get on, stopped and prevented the access of the blogger to the blogs so that he could not continue his "offended" blog about Russia in order to protect its reputation. ...read more.


D. A SOLUTION TO A PROBLEM ARISING FROM THE ISSUE Facebook and Twitter should have automatic back-up as the safety barrier, and if the attacks happen, websites should put the announcement, like what Twitter did, on their homepage since they cannot log into the sites. By doing that, the owners of the websites let users know what is going and they will be calmer and at ease. Installment and maintaining anti-virus software and firewall are also ways to prevent Denial of Service attack as well as setting up a filter, which will lock the data before it reaches the server, then it will check for errors by detecting the patterns contained in the data. In addition, firewalls can allow and deny protocols, effectively stop users from getting simple flooding type attacks. Denial-of-Service attacks also violate regulations within some countries, for example, in the United Kingdom, there has been the "Police and Justice Act 2006" to restrict the Denial-of Service attacks, and the penalty for violation is 10 years in prison. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    You will be aware of your subtotal as you go along adding items from your list, so you'll have an easier time keeping on top of the grocery budget. Cons of Online Grocery Shopping You may miss out on significant savings through the use of store specials and coupons.

  2. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    So, what are some of these problems? 1. Financial difficulties to upgrade to the EMR such as buying software, etc.. 2. Training to utilize this new system and understand the capabilities of this technology. 3. Technology factors like making sure that it is integrated with widely used systems and computer software for ease.

  1. The use of Twitter in the 3.11 Earthquake Tsunami Disaster

    This was one of the ways families and relatives and even friends in the overseas made sure they were safe and were not in danger. My experience explained earlier was one of them, how my friends and me contacted and kept safe.

  2. ITGS portfolio Extension

    What do you think of Wi-Fi as a technology? Wi-Fi is used by most personal computer operating systems, video game consoles, laptops, smart phones and many other electronic devices. By means of a router connected to a modem a Wi-Fi network can be created which provides wireless access to the internet.

  1. To what Extent Does Government Know What is Best for its Subjects? (Stimulus: Antigone)

    Among the most stringently censored Internet locations are pornography websites2. The supposed thinking behind this is that by restricting the freedom to view pornography, the PRC is able to maintain moral integrity amongst its citizens. By terminating certain liberties, the government of the PRC is presupposing that it knows what is best for its people.

  2. Information Technology in a Global Society - Is integrity a difficulty when students use ...

    on the rest of the page, if something isn't right, the editor and manager of the page would be alerted. As an example the device could detect the words "Pete loves PANCAKE" after it was change then scan the rest of the entry for similarity in the words and phrases,

  1. Information Technology in a Global Society - analysis of an article "Using data mining ...

    Most concern of privacy issues with data mining would come from Health related data since they are the ones that constrain the most information, from the patient's name, address to their whole medical history, its almost like a story book into one's life.

  2. GCSE Welsh Baccalaureate Completed Diary Pages

    come to the realisation that there are many other circumstances leading to people ending up on the streets. To my surprise many war veterans have returned with Post Traumatic Stress, and have been unable to acquire a job ? no one notices them, leading them to the unfortunate situation of being left on the streets.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work