• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What are the effects of the attacks that caused Facebook to be degraded and a black-out on Twitter for two hours?

Extracts from this document...

Introduction

International Baccalaureate Information Technology in a Global Society Portfolio (http://news.bbc.co.uk/2/hi/technology/8190786.stm) What are the effects of the attacks that caused Facebook to be degraded and a black-out on Twitter for two hours? (Politics and government) August,, 2009 Tran Thai Bao Khanh The British International School Vietnam News Item: BBC News, 2009, Web attack blogger blames Russia, http://news.bbc.co.uk/2/hi/technology/8190786.stm [August 2009] A. PRESENTATION OF THE ISSUE The article "Web attack Blogger Blames Russia" on BBC website attracted my attention to an attack of an activist Georgy, whose nickname was Cyxymu, to sites such as Facebook, Twitter, and Google. However, Cyxymu claimed that he was aimed at the attack not the one that was attacking, and Russia was behind all this as the government did not want the public to know what they did to Georgian people, since the blogger just wrote the truth about the Russian-Georgian war, which started a year ago, and all the sites where he had his blogs and videos posted on were "attacked" (Twitter, Facebook, Live Journal, and Google). ...read more.

Middle

For usual connection, the server verifies the request and allows the users to get the access, however, in case of DoS, the monitor sending the request will be controlled by the attackers who try to "flood" the server with a lot of "requests" making it not being able to process them. DoS attacks can only happen when there is internet connection. According to Brandee Barker, no user data was damaged or lost. In conclusion, the whole purpose of attacker carrying out DoS attacks to Facebook and Twitter was to prevent Cyxymu getting on the website, as usually, the no damages were caused. C. THE IMPACT OF THE ISSUE Denial-of-Service attacks only benefit the attackers. According to this article, if the attacker was really the Russia Government, by applying the DoS attacks to those websites that Cyxymu was trying to get on, stopped and prevented the access of the blogger to the blogs so that he could not continue his "offended" blog about Russia in order to protect its reputation. ...read more.

Conclusion

D. A SOLUTION TO A PROBLEM ARISING FROM THE ISSUE Facebook and Twitter should have automatic back-up as the safety barrier, and if the attacks happen, websites should put the announcement, like what Twitter did, on their homepage since they cannot log into the sites. By doing that, the owners of the websites let users know what is going and they will be calmer and at ease. Installment and maintaining anti-virus software and firewall are also ways to prevent Denial of Service attack as well as setting up a filter, which will lock the data before it reaches the server, then it will check for errors by detecting the patterns contained in the data. In addition, firewalls can allow and deny protocols, effectively stop users from getting simple flooding type attacks. Denial-of-Service attacks also violate regulations within some countries, for example, in the United Kingdom, there has been the "Police and Justice Act 2006" to restrict the Denial-of Service attacks, and the penalty for violation is 10 years in prison. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. Internet and computer safety

    off guard as they wish to do some shopping only to find their details have been taken. There are web pages and methods to help prevent this today and keep users safe however it is still a large scale problem.

  2. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    Electronic Prescribing Electronic prescribing or e-prescribing (eRx) is a way for your doctor and other health care providers to send your prescriptions to your pharmacy electronically. Instead of writing out a prescription and having you take it to your drugstore, your doctor orders your medication through her office computer, which then sends a secure electronic prescription to your pharmacist.

  1. The use of Twitter in the 3.11 Earthquake Tsunami Disaster

    This was one of the ways families and relatives and even friends in the overseas made sure they were safe and were not in danger. My experience explained earlier was one of them, how my friends and me contacted and kept safe.

  2. Information Technology in a Global Society - analysis of an article "Using data mining ...

    Science, notes that data-mining techniques, once used for scientific analysis or for detecting potential credit card fraud, increasingly are being applied to personal activities, conversations and movements, such as information that can be deduced about an individual by monitoring that person's smart phone.

  1. According to the standards within the Ln Yu, has the Confucian gentleman survived to ...

    Since then the ideas of virtue had stretched outward in the metaphysical world and other philosophers were able to make of it what they wanted and walls were built slowly. The earliest successors of the philosophical world heading westward were the Platonists, their virtues the same as Confucius' without the

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Bibliography: 1. Wood, Zoe. "Amazon launches online groceries division as Ocado gears up for flotation." Guardian.co.uk. 7 July 2010. 10 Oct 2010. <http://www.guardian.co.uk/business/2010/jul/07/amazon-groceries-ocado-flotation> 2. Watrous, Lucinda. "Online Grocery Shopping: Pros and Cons." Bright Hub. 12 Feb 2010. 30 Sept 2010. <http://www.brighthub.com/money/personal-finance/articles/34470.aspx> 3. Blakemore, Erin. "Online Grocery Shopping." Love to know.

  1. ITGS portfolio Extension

    networks would become more difficult and this would make network more secure According to Mr. Paraskar The crime rate has almost doubled with the growth of Wi-Fi networks because of hacking and misuse of Wi-Fi. Networks by hackers and the other reason is that many people are not aware of

  2. GCSE Welsh Baccalaureate Completed Diary Pages

    In contrast, street passers looked at the homeless in awkward disdain. My ignorant view of how being homeless is a product of laziness became obsolete, as I recognised how children could be born into homelessness, and war-veterans were redundant in the streets.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work