Computers And Security Cyberattacks On Essay

S. government sites. The July 6 update increased the number to 21 U.S. sites. On July 7, the South Korean sites were added and on July 8, the total number of sites reached 26 ("No Sign of N. Korea Backing," 2009) The U.S. Websites were back up and running within a day of the attack. The South Korean sites took more time to recover ("Cyberattacks Jam Government," 2009). Also, this incident was South Korea's third wave in 2009 ("South Korean Websites Hobbled," 2009)

One of the reasons that the U.S. was able to recover more quickly than South Korea is because the websites targeted immediately contacted McAfee and other private agencies to minimize the damage and reverse engineer the attack ("North Korea Blamed, 2011). They also worked with Internet service providers to filter and block the attacks ("South Korean Websites Hobbled," 2009) . Four days after the attack began, some of the South Korean sites still remained inaccessible or unstable ("Cyberattacks Jam Government," 2009)

Works Cited

Baldor, L. (2011, October 29). North Korea Blamed For Cyberattack On U.S., South Korea: Report . huffingtonpost.com. Retrieved October 29, 2011, from http://www.huffingtonpost.com/2011/07/05/north-korea-cyberattack_n_890305.html

...

(2009, July 10). South Korean Web Sites Are Hobbled in New Round of Attacks. washingtonpost.com. Retrieved October 29, 2011, from http://www.washingtonpost.com/wpdyn/content/story/2009/07/08/ST2009070801296.html
Keitzer, G. (2009, July 8). No sign of N. Korean backing in bot attacks on U.S. sites, says researcher. computerworld.com. Retrieved October 29, 2011, from http://www.computerworld.com/s/article/9135306/No_sign_of_N._Korean_backing_in_bot_attacks_on_U.S._sites_says_researcher?taxonomyId=1

Raphael, J. (2009, July 8). The U.S.-South Korea Cyberattack: How Did It Happen?. pcworld.com. Retrieved October 29, 2011, from http://www.pcworld.com/article/168084/the_ussouth_korea_cyberattack_how_did_it_happen.html

Ratnam, G., & Neher, J. (2009, July 8). U.S. Web Sites Continue to Suffer Attacks by Hackers (Update2) . bloomberg.com. Retrieved October 29, 2011, from http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aVEB6XhdZTFA

Sang-Hun, C., & Markoff, J. (2009, July 8). Cyberattacks Jam Government and Commercial Web Sites in U.S. And South Korea . Nytimes.com. Retrieved October 29, 2011, from http://www.nytimes.com/2009/07/09/technology/09cyber.html

Sources Used in Documents:

Raphael, J. (2009, July 8). The U.S.-South Korea Cyberattack: How Did It Happen?. pcworld.com. Retrieved October 29, 2011, from http://www.pcworld.com/article/168084/the_ussouth_korea_cyberattack_how_did_it_happen.html

Ratnam, G., & Neher, J. (2009, July 8). U.S. Web Sites Continue to Suffer Attacks by Hackers (Update2) . bloomberg.com. Retrieved October 29, 2011, from http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aVEB6XhdZTFA

Sang-Hun, C., & Markoff, J. (2009, July 8). Cyberattacks Jam Government and Commercial Web Sites in U.S. And South Korea . Nytimes.com. Retrieved October 29, 2011, from http://www.nytimes.com/2009/07/09/technology/09cyber.html


Cite this Document:

"Computers And Security Cyberattacks On" (2011, October 30) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/computers-and-security-cyberattacks-on-46995

"Computers And Security Cyberattacks On" 30 October 2011. Web.25 April. 2024. <
https://www.paperdue.com/essay/computers-and-security-cyberattacks-on-46995>

"Computers And Security Cyberattacks On", 30 October 2011, Accessed.25 April. 2024,
https://www.paperdue.com/essay/computers-and-security-cyberattacks-on-46995

Related Documents

This particular instance was significant as the attackers used a generic approach instead of a site specific or application specific exploitation by devising tools that used the web search engines to identify ASP applications that are vulnerable. SQL injection attack was used to propagate the malicious code that exploited zero day vulnerability in Microsoft Internet explorer last year. [Symantec, (2009 ) pg. (47)] the aim of the attackers employing

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Critical Information Literacy: Tools for CourseworkToday, cyberattacks are disrupting and even destroying the computer operations of countless business of all sizes and types, and hackers appear capable of overcoming the latest protections that are available. Fortunately, there are some steps that business practitioners can take to protect their computer files from cyberattacks. To learn more about these, the purpose of this paper is to provide a review of selected resources

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

computer systems are increasingly being used to cause widespread damage, with nation-states or individuals sponsored by nation-states making use of malicious codes to compromise 'enemy' information systems. In essence, cyber warfare has got to do with the attack on the information networks, computers, or infrastructure of another entity by an international organization or nation-state. In the context of this discussion, cyber war will be taken as the utilization of

If not, what other recommendations would you make to Harold? Explain your reasons for each of recommendations. No, the actions that were taken by Harold are not adequate. The reason why, is because he has created an initial foundation for protecting sensitive information. However, over the course of time the nature of the threat will change. This could have an impact on his business, as these procedures will become ineffective.