The Pros And Cons Of Websites

Improved Essays
We live in an amazing time. Every day we use technology in ways where even ten years ago people would never have dreamed of. We communicate with people instantly around the world, check the weather and local news, are reminded of our meetings and appointments and so many other things all with a little computer that we can keep in our pocket. Many of us have become reliant to do everything online. Whether shopping, going to school and doing our homework, paying our bills, and even doing our banking. This doesn’t include all of the major corporations and the reliance that they have on using technology and the internet. So what would happen if these technologies that we all rely on no longer worked? What if websites that you rely on every day …show more content…
This attack, which happened in multiple waves, made it so many websites were inaccessible. Sites such as Twitter, SoundCloud, Spotify, Shopi, fyBox, Boston Globe, New York Times, Github, Airbnb, Reddit, Freshbooks, Heroku and Vox Media properties (Conger, 2016).
Just what exactly is a DDoS attack and how can it bring down so many sites? A DDoS attack is where there is an attempt bring down a website or online service by flooding and overwhelming it with traffic from multiple sources (understanding-ddos, 2013). In the attack that happened to Dyn there were tens of millions of IP addresses hitting the servers at the same time (Turton, 2016). A DNS server is a server that stores a database of domain names, such as www.lds.org, and maps them to a public IP address. This makes it so instead of having to know the IP address of a website you can just access it by typing in the domain name. When the DDoS attack was happening, those tens of millions of IP addresses were taking all the resources and processing power of the DNS server so it couldn’t keep up with all the requests. Thus making it impossible for you to reach your desired
…show more content…
If you want to work in the information technology industry then there is one thing that you must do, never stop learning. Getting a degree is a good start and will arm you with the essentials and a solid foundation. On top of getting an education, experience and obtaining certifications will help you to be able to stay on top of the game and allow you to properly protect your site. There are a number of security certifications that you can get. According to Ed Tittel, from tomsitpro.com, the best information security certificates that you can get for 2016 are: CompTIA Security +, CEH: Certified Ethical Hacker, GSEC: SANS GIAC Security Essentials, CISSP: Certified Information Systems Security Professional, and CISM: Certified Information Security Manager (Tittel, 2015). He said in the article that, “When it comes to information security, you need only read the headlines to observe that those with malicious intent constantly find new and scary ways to access and misuse privileged information for criminal, unscrupulous or questionable purposes” (Tittel, 2015). This shows and proves that to make it in the information technology you can’t stay

Related Documents

  • Improved Essays

    Description of the remaining publicly available datasets is given in Table 5.1. The Conficker P2P botnet dataset contains data from the UCSD Network Telescope for three days between November 2008 and January 2009. The first day, 21st November 2008 data, covers the onset of the Conficker A infection. On the second day, 21st December 2008, only Conficker A was active and during the third day both Conficker A and B were active.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    How has technology changed since the days of the typewriter and scribbling on leaves in the old days? In recent discussions of how technology is dominating the lives of people today, a controversial issue has been whether technology makes us lazier and less prone to find information we need without the web. On one hand, some argue that the internet is a extremely useful tool that can be used to very efficiently obtain the information that is needed. On the other hand, however, some argue that the internet is becoming the center of many people’s lives and they’re beginning to become dependent on it. The best perspective on this issue is reflected by Nicholas Carr in his book The Shallows when he writes, “The price we pay to assume technology’s…

    • 364 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the end, the web is just a tool; how you use will determine if it has a positive or negative outcome. People are used to living in a deterministic world where they think that the human choices and decisions have sufficient causes. The process of technology being more reliable and iterative is being feared by the creator themselves. Cyber-security expert, Colin Williams, explained how technology has always reshaped society and that “we tell ourselves stories to try to understand why and how.” Nowadays, we depend more on technology than we do with our brain.…

    • 972 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nicholas Carr vs Kevin Kelly Imagine a world where the internet, electronic devices, smartphones, or any type of technology that you have ever known, did not exist. How could you live without these tools? Technology has been innovating society for the past centuries. People all around the world have been benefited by the new products that technology has to offer. It is almost impossible to imagine a society without technology.…

    • 817 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The internet is always trying to sell people something, making products glamorous and giving people false advertising so that they can spend more money on things they do not need. However, this is only a fragment of human existence. An economic model will never satisfy all of human needs and desires, which includes interaction that money and technology will never be able to…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    What if one day the internet ceased to exist? In a society that is becoming increasingly dependent on the internet and affiliated technologies, such a scenario may seem like the end of the world. Imagine people without their smartphones, tablets, or computers. With a remarkable lack of face to face interaction and landline phones, communication would plummet to an all-time low. Millions of people would be out of jobs, and millions more would not know how to get to theirs.…

    • 2003 Words
    • 9 Pages
    Improved Essays
  • Superior Essays

    Since the events on September 11, 2001, there have been 20 known terrorist plots against New York City. Meaning that, on average, there has been one or two attempted terrorist attacks every year in New York City. These plots were meant to cause economic and social destruction at specific points around New York City. Most of these attacks were set in places such as subways, airports, synagogues, and important business places. With the attacks at these places, there could have been many thousands of deaths from any one attack.…

    • 1901 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    One of the worst terrorists attacks in U.S. history occurred in the date 9/11 in 2001. The attack was about the World Trade Center collapsing to the ground, the Pentagon under attacked, and an attempting to destroy the White House. I interviewed my mom and she says this attack had enough coverage all over the local news and she watched the attack at the hospital after giving birth to my brother. I previously never knew that the Twin Towers were alive or gone today until I found out it’s gone now. How the attack happened was that several Islamic extremists or a group of terrorists called the “Al Qaeda” hijacked 4 planes and two of them hit the Twin Towers directly from the top and were both set on fire.…

    • 506 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    However has had more negative affects on society than positive. Older doctors and patients as well do not know how to use a tablet, nor can they text on a cell phone some do not even know how to work a computer. Visits to the library are infrequent now due to internet access, which isn 't always legitimate due to lack of research. People believing they are smart because if computers correcting their mistakes, individuals not stimulating their minds on their own effort, becoming lazy and dependent on technology. Identity theft has also had a negative affect on people lives when doing online shopping by entering your credit card information, as well as your social security…

    • 1188 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Denial-Of-Service Attack

    • 756 Words
    • 4 Pages

    “Denial-of-Service attacks are the cyber equivalent of vandalism. Rather than seek to break into the target system, the perpetrator simply wishes to render the target system unusable” (Easttom, Taylor, 2011). This type of cybercrime prevents the end users from attaining the resource accessibility. Denial-of-Service is also known as a DOS. An attack was launched in Santa Cruz County website in California that caused “county’s government entities and programs, including Emergency Services, Law Enforcement, the Courts, Social Services, Agricultural Extension, Employment, Surplus Sales, Vendor Registration, and Construction Projects and Proposals”( U.S. Attorney’s Office,2011).…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The attacks also caused at least $10 billion in infrastructure and property damage. This event caused many other countries around the world including The United States of America, to reevaluate anti-terrorism methods and to strengthen them so this incident doesn't happen…

    • 1730 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Ipremier Case Summary

    • 961 Words
    • 4 Pages

    IPremier was not prepared for this seventy-five minute attack. This is mainly due to the fact that they were using an outdated and unreliable internet hosting company. IPremier contracted Qdata, who was an internet hosting company that provides them with their computer equipment and internet connection. Qdata was not viewed as an industry leader and iPremier had many troubles with their systems. The reason that iPremier uses Qdata is because one of the founders’ close friends is a founder of Qdata, this makes for a conflict of interest.…

    • 961 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    If a society wants to change something, it can be as easy as a click of a button. The internet gives us the opportunity to earn our education without the use of books and paper. Teachers and students can communicate with a touch of a button, not having to physically interact with each other. Businesses and corporations can sell and advertise their products immediately now than ever. This has made American society more efficient in living.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The brain has the ability to reprogram itself on the fly, altering the way it functions" (Carr 60). While reading Nicholas Carr 's article "Is Google Making Us Stupid? What the Internet Is Doing to Our Brains", one may feel they have taken a seat on the most intellectual and fascinating roller coaster. In the 2008 article published in the Atlantic, Carr effectively explains not only what an obsessive amount of surfing the web is progressively doing to our lives but in our lives. He does an exceptional job at delivering his findings to the audience without overly complicating it.…

    • 1167 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Android Malware and Botnets Malware in differing forms has been present since computers were first invented. One of the most interesting kinds of malware is that which takes control of a computer and reports back to the malicious actor that infected the computer. The malware allows an attacker to use the infected computer, effectively making the computer a bot. Normally, these bots are part of a network of infected computers known as a botnet. The attacker in control of a botnet can use it for a variety of purposes.…

    • 2049 Words
    • 9 Pages
    Great Essays