S. government sites. The July 6 update increased the number to 21 U.S. sites. On July 7, the South Korean sites were added and on July 8, the total number of sites reached 26 ("No Sign of N. Korea Backing," 2009)
The U.S. Websites were back up and running within a day of the attack. The South Korean sites took more time to recover ("Cyberattacks Jam Government," 2009). Also, this incident was South Korea's third wave in 2009 ("South Korean Websites Hobbled," 2009)
One of the reasons that the U.S. was able to recover more quickly than South Korea is because the websites targeted immediately contacted McAfee and other private agencies to minimize the damage and reverse engineer the attack ("North Korea Blamed, 2011). They also worked with Internet service providers to filter and block the attacks ("South Korean Websites Hobbled," 2009) . Four days after the attack began, some of the South Korean sites still remained inaccessible or unstable ("Cyberattacks Jam Government," 2009)
Works Cited
Baldor, L. (2011, October 29). North Korea Blamed For Cyberattack On U.S., South Korea: Report . huffingtonpost.com. Retrieved October 29, 2011, from http://www.huffingtonpost.com/2011/07/05/north-korea-cyberattack_n_890305.html
Keitzer, G. (2009, July 8). No sign of N. Korean backing in bot attacks on U.S. sites, says researcher. computerworld.com. Retrieved October 29, 2011, from http://www.computerworld.com/s/article/9135306/No_sign_of_N._Korean_backing_in_bot_attacks_on_U.S._sites_says_researcher?taxonomyId=1
Raphael, J. (2009, July 8). The U.S.-South Korea Cyberattack: How Did It Happen?. pcworld.com. Retrieved October 29, 2011, from http://www.pcworld.com/article/168084/the_ussouth_korea_cyberattack_how_did_it_happen.html
Ratnam, G., & Neher, J. (2009, July 8). U.S. Web Sites Continue to Suffer Attacks by Hackers (Update2) . bloomberg.com. Retrieved October 29, 2011, from http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aVEB6XhdZTFA
Sang-Hun, C., & Markoff, J. (2009, July 8). Cyberattacks Jam Government and Commercial Web Sites in U.S. And South Korea . Nytimes.com. Retrieved October 29, 2011, from http://www.nytimes.com/2009/07/09/technology/09cyber.html
This particular instance was significant as the attackers used a generic approach instead of a site specific or application specific exploitation by devising tools that used the web search engines to identify ASP applications that are vulnerable. SQL injection attack was used to propagate the malicious code that exploited zero day vulnerability in Microsoft Internet explorer last year. [Symantec, (2009 ) pg. (47)] the aim of the attackers employing
His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive
Critical Information Literacy: Tools for CourseworkToday, cyberattacks are disrupting and even destroying the computer operations of countless business of all sizes and types, and hackers appear capable of overcoming the latest protections that are available. Fortunately, there are some steps that business practitioners can take to protect their computer files from cyberattacks. To learn more about these, the purpose of this paper is to provide a review of selected resources
Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields
computer systems are increasingly being used to cause widespread damage, with nation-states or individuals sponsored by nation-states making use of malicious codes to compromise 'enemy' information systems. In essence, cyber warfare has got to do with the attack on the information networks, computers, or infrastructure of another entity by an international organization or nation-state. In the context of this discussion, cyber war will be taken as the utilization of
If not, what other recommendations would you make to Harold? Explain your reasons for each of recommendations. No, the actions that were taken by Harold are not adequate. The reason why, is because he has created an initial foundation for protecting sensitive information. However, over the course of time the nature of the threat will change. This could have an impact on his business, as these procedures will become ineffective.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now