Verified Document

Computers And Security Cyberattacks On Essay

S. government sites. The July 6 update increased the number to 21 U.S. sites. On July 7, the South Korean sites were added and on July 8, the total number of sites reached 26 ("No Sign of N. Korea Backing," 2009) The U.S. Websites were back up and running within a day of the attack. The South Korean sites took more time to recover ("Cyberattacks Jam Government," 2009). Also, this incident was South Korea's third wave in 2009 ("South Korean Websites Hobbled," 2009)

One of the reasons that the U.S. was able to recover more quickly than South Korea is because the websites targeted immediately contacted McAfee and other private agencies to minimize the damage and reverse engineer the attack ("North Korea Blamed, 2011). They also worked with Internet service providers to filter and block the attacks ("South Korean Websites Hobbled," 2009) . Four days after the attack began, some of the South Korean sites still remained inaccessible or unstable ("Cyberattacks Jam Government," 2009)

Works Cited

Baldor, L. (2011, October 29). North Korea Blamed For Cyberattack On U.S., South Korea: Report . huffingtonpost.com. Retrieved October 29, 2011, from http://www.huffingtonpost.com/2011/07/05/north-korea-cyberattack_n_890305.html

Parts of this document are hidden

View Full Document
svg-one

(2009, July 10). South Korean Web Sites Are Hobbled in New Round of Attacks. washingtonpost.com. Retrieved October 29, 2011, from http://www.washingtonpost.com/wpdyn/content/story/2009/07/08/ST2009070801296.html
Keitzer, G. (2009, July 8). No sign of N. Korean backing in bot attacks on U.S. sites, says researcher. computerworld.com. Retrieved October 29, 2011, from http://www.computerworld.com/s/article/9135306/No_sign_of_N._Korean_backing_in_bot_attacks_on_U.S._sites_says_researcher?taxonomyId=1

Raphael, J. (2009, July 8). The U.S.-South Korea Cyberattack: How Did It Happen?. pcworld.com. Retrieved October 29, 2011, from http://www.pcworld.com/article/168084/the_ussouth_korea_cyberattack_how_did_it_happen.html

Ratnam, G., & Neher, J. (2009, July 8). U.S. Web Sites Continue to Suffer Attacks by Hackers (Update2) . bloomberg.com. Retrieved October 29, 2011, from http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aVEB6XhdZTFA

Sang-Hun, C., & Markoff, J. (2009, July 8). Cyberattacks Jam Government and Commercial Web Sites in U.S. And South Korea . Nytimes.com. Retrieved October 29, 2011, from http://www.nytimes.com/2009/07/09/technology/09cyber.html

Sources used in this document:
Raphael, J. (2009, July 8). The U.S.-South Korea Cyberattack: How Did It Happen?. pcworld.com. Retrieved October 29, 2011, from http://www.pcworld.com/article/168084/the_ussouth_korea_cyberattack_how_did_it_happen.html

Ratnam, G., & Neher, J. (2009, July 8). U.S. Web Sites Continue to Suffer Attacks by Hackers (Update2) . bloomberg.com. Retrieved October 29, 2011, from http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aVEB6XhdZTFA

Sang-Hun, C., & Markoff, J. (2009, July 8). Cyberattacks Jam Government and Commercial Web Sites in U.S. And South Korea . Nytimes.com. Retrieved October 29, 2011, from http://www.nytimes.com/2009/07/09/technology/09cyber.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Forensic Tools: The Use of Computers
Words: 1019 Length: 3 Document Type: Essay

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

Computer Science Fundamentals Too Often the Mechanistic
Words: 1481 Length: 5 Document Type: Essay

Computer Science Fundamentals Too often the mechanistic are taken for granted in computer science. The technology has been around long enough now, that many take for granted the great powers that computers and computing technology has afforded modern man and his society. The fundamental characteristics of any successful endeavor should be investigated to help identify a pattern and produce learning and gather information. The purpose of this essay is identify and explain

Computer Dependence the Story of Pandora's Box
Words: 1586 Length: 6 Document Type: Essay

Computer Dependence The story of Pandora's Box reveals the dangers that technology brings along with its many gifts. Today, some very interesting cultural changes are beginning to take hold of society that stems from the dependence on technology and the way that it is interwoven into culture. The purpose of this essay is to examine the relationship between computer technology and the corresponding dependence that is created by this relationship. This

Computer History Museum
Words: 802 Length: 3 Document Type: Term Paper

Computer History Museum: A virtual visit Description of the event The Computer History Museum has both an online and a 'real world' incarnation. It is a physical warehouse of different types of computers, a virtual catalogue of computer history throughout the ages, and also provides information about specific topics pertinent to computer history, such as the history of video games. The Museum contains artifacts such as the first calculators, 'punch cards' and

Computer Addiction: Causes and Potential
Words: 874 Length: 3 Document Type: Research Paper

This is what creates the continual need to share literally everything going on in their lives, as each post releases a significant dopamine rush (Charman-Anderson, 17, 18). Dopamine is also the reason why the many forms of computer addiction are so difficult to treat. With anonymity comes the opportunity to create multiple identities or personas online (Soule, 66, 67). This is what leads employees who have Internet addictions to create

Computer History It Is Said
Words: 1593 Length: 5 Document Type: Research Paper

In some areas it will be used for more populist applications such as, in schools to introduce students to the discipline and within an environment that will give opportunity for participation of non-academics in academic discussion. Conclusion Computer has in a great deal widened the world's knowledge. As the fastest technology that has ever evolved, it has given opportunity for the children and adults, for personal, academic and commercial use. It

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now