The Pros And Cons Of Websites

Improved Essays
We live in an amazing time. Every day we use technology in ways where even ten years ago people would never have dreamed of. We communicate with people instantly around the world, check the weather and local news, are reminded of our meetings and appointments and so many other things all with a little computer that we can keep in our pocket. Many of us have become reliant to do everything online. Whether shopping, going to school and doing our homework, paying our bills, and even doing our banking. This doesn’t include all of the major corporations and the reliance that they have on using technology and the internet. So what would happen if these technologies that we all rely on no longer worked? What if websites that you rely on every day …show more content…
This attack, which happened in multiple waves, made it so many websites were inaccessible. Sites such as Twitter, SoundCloud, Spotify, Shopi, fyBox, Boston Globe, New York Times, Github, Airbnb, Reddit, Freshbooks, Heroku and Vox Media properties (Conger, 2016).
Just what exactly is a DDoS attack and how can it bring down so many sites? A DDoS attack is where there is an attempt bring down a website or online service by flooding and overwhelming it with traffic from multiple sources (understanding-ddos, 2013). In the attack that happened to Dyn there were tens of millions of IP addresses hitting the servers at the same time (Turton, 2016). A DNS server is a server that stores a database of domain names, such as www.lds.org, and maps them to a public IP address. This makes it so instead of having to know the IP address of a website you can just access it by typing in the domain name. When the DDoS attack was happening, those tens of millions of IP addresses were taking all the resources and processing power of the DNS server so it couldn’t keep up with all the requests. Thus making it impossible for you to reach your desired
…show more content…
If you want to work in the information technology industry then there is one thing that you must do, never stop learning. Getting a degree is a good start and will arm you with the essentials and a solid foundation. On top of getting an education, experience and obtaining certifications will help you to be able to stay on top of the game and allow you to properly protect your site. There are a number of security certifications that you can get. According to Ed Tittel, from tomsitpro.com, the best information security certificates that you can get for 2016 are: CompTIA Security +, CEH: Certified Ethical Hacker, GSEC: SANS GIAC Security Essentials, CISSP: Certified Information Systems Security Professional, and CISM: Certified Information Security Manager (Tittel, 2015). He said in the article that, “When it comes to information security, you need only read the headlines to observe that those with malicious intent constantly find new and scary ways to access and misuse privileged information for criminal, unscrupulous or questionable purposes” (Tittel, 2015). This shows and proves that to make it in the information technology you can’t stay

Related Documents

  • Improved Essays

    Spear Phishing Attacks

    • 747 Words
    • 3 Pages

    A “Denial of service is conducted when a multitude of systems are bombarded with traffic, which chokes the targeted networks and renders them unavailable to users.” (Hoffman, 2013, pg. 1). According to Hoffman, one of the earliest cases of DDoS was reported in 1999 against the IRC server of the University of Minnesota, which left 227 systems affected and the university’s server was out of service for several days. The DDoS attack can be crippling and often results in major disruption of business services. These types of attacks can have a significant financial impact on an organization and have the potential to cause enormous damage.…

    • 747 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    There is a subtle difference between security and protection, we will perceive that both of them are extremely close concepts but still not the same. Protection is assured if one has all the necessary security measures as security itself is a type of protection to all the external hazards. Information is a treasure which is immensely worthy to an organization and thus it needs to be protected firmly. It is easy to corrupt, lose and steal thus the measures needed or taken to secure them from irrelevant entries are mentioned as Information Security. The significant step taken by most of the Organizations or firms recently is the use of ethical hacking process or techniques to evaluate the success or failure of their current security measures.…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Technology Dependency The internet is negative in many ways. The internet can keep people from being socially active in personal communication. People’s identities are ruined by social media. A girl or guy may send out a personal picture of themselves naked and it may spread worldwide. This happens quite often.…

    • 893 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Cyber Security Issues

    • 1272 Words
    • 6 Pages

    Supervalu, US supermarket chain, lost its customer’s credit data after threaten in 2014. The reason of breach was still unknown and Supervalu’s stock in New York stock market fell down extremely due to data leakage. [10] Furthermore, in order to revenge, Iran attacked US banks in 2013. This threat targeted Citigroup as well and spread widely including HSBC, PNC and other big banks, as a result, all web stations they attacked collapsed [11]. Threats on business follow with information and…

    • 1272 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    A: One reason is that ubiquitous computing can cause social issues especially with work. With this type of technology, your work is with you at all times…anywhere and anytime, everywhere. In the corporate world, in many cases, it is an unwritten rule that you are available for work, twenty-four hours a day, seven days a week. There seems to me no “down” time for rest and relaxation. A second drawback is the ease of security and fraud.…

    • 705 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Why Cybersecurity is Important for Every Company. In today’s world, almost every single business, from small to large corporations, needs to have an online presence to grow and increase their customer base no matter what the focus area of the company is. For example, it does not matter if the company is specialized in food, clothes, insurance, car repair, phone service. In addition to having an online page, when companies grow they also need a computer network to facilitate communication between their employees, customers, and business partners, as well as to store information about the company such as customer, employee, products, and financial data. Having all of this in place does not guarantee success and grow for a business because there…

    • 2526 Words
    • 11 Pages
    Great Essays
  • Improved Essays

    You will definitely learn the principles of system security and experiment with different strategies. As a hacker, you might want to go beyond common restrictions and execute your program. Another thing is that you might not worry about possible dangers. Defend like a professional As stated earlier, the major difference between a malicious (“black hat”) hacker and a helpful (“white hat”) hacker is what they intended to achieve with their hacking skills. As a security expert you’ll understand all the possible intricacies and how you can use them to your own benefits.…

    • 803 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Rhetorical Analysis: How Do The Elements Work? What elements make a good document or webpage that could get people's attention? It is all about how effectively that piece of writing uses the rhetorical appeals - which are ethos, pathos, and logos. The Federal Bureau of Investigation's (FBI's) webpage about Cyber Crime to see how the rhetorical appeals work within different writings. The webpage comes from the FBI themselves and they wrote this webpage to tell about what is Cyber Crime and how it can affect many people.…

    • 869 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Examples Of SQL Injection

    • 820 Words
    • 4 Pages

    There are so many websites which have had these kinds of attacks in which usernames, passwords and other private data was accessed and stolen. One such attack occurred in year 2015 on Vtech servers. The interactive toys manufacture’s servers suffered from an SQL injection attack where the hacker managed to access over 2.3 million pictures and over 4.83 million emails addresses, usernames and passwords. Outcomes of SQL Injection An attacker gaining administrative access is a big security risk. • The attacker can steal, delete or alter parts or the entire data • Launch attacks from compromised server • Unauthorized access to all personal data or company data, confidential information, customers data etc SQL injection takes advantage of the vulnerabilities in publicly available, user-supplied data fields in the web application.…

    • 820 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    “Cyberbullying is defined as "bullying that involves the use of e-mail, instant messages, and digital images sent via cellular phones, Web pages, Web logs (blogs), chat rooms or discussion groups and other information technologies” (Mooney 34). The effects of cyberbullying can be catastrophic. They include a lapse in homework, depression, sleeping issues, and even suicide in extreme situations. Many different types of cyberbullying exist among the various social networking sites. These include flaming, harassment, denigration, exclusion or ostracism, cyberstalking, harmful video recordings, and sexting.…

    • 1873 Words
    • 8 Pages
    Improved Essays