HOME TECH TRENDS ONLINE SAFETY SOCIAL NETWORKING APP COLLECTIONS HOW-TO THE ONLINE MOM BLOG ARCHIVE EN ESPAÑOL
Technology A-Z
 
The Internet
 
Tech Hardware
 
Tech Software
 
Video Games
 
Protecting Your Children
 
FAQs
 
Getting Help
 
The Online Mom Network
 


Learn about The Online Mom Network
Join The Online Mom Network
How Do I Become An Online Mom?


The Online Mom provides internet technology advice and information to help parents protect their kids, encourage responsible behavior and safely harness the power of technology in the new digital world. Social networking, photo sharing, video games, IM & texting, internet security, cyberbullying, educational resources, the latest on tech hardware, gadgets and software for kids 3-8, tweens and teens, and more.

Web Sites Suffer Cyber Attacks



By Michael Connolly

This week saw numerous reports of the widespread cyber attacks that overwhelmed government and other web sites in the United States and South Korea over the holiday weekend. Although security agencies haven’t been able to definitively identify the attackers, there has been unofficial finger-pointing towards North Korea.

While Treasury Department and Federal Trade Commission web sites were shut down for extended periods, other government web sites like WhiteHouse.gov and DefenseLINK were able to weather the storm relatively unscathed. The uneven response set alarm bells ringing and underscored how difficult it is to ward off coordinated and multi-pronged attacks.

How do these cyber attacks work and what are the goals of the attackers? This particular type of assault is known  as a "denial-of-service" attack. Think about what would happen if you and everyone you know tried to call the same restaurant over and over and order things you didn't even want. You would jam the phone lines and overwhelm the kitchen to the point that it couldn't take any more orders. That's basically what happens to web sites when they are hit with denial-of-service attacks. They're knocked offline by too many junk requests from computers controlled by the attackers.

To orchestrate the attack, the bad guys use "botnets," or networks of "zombie" personal computers that have been infected with a virus. The virus lets the attackers remotely control the machines, which are programmed to contact certain web sites over and over until they overwhelm the host servers. The servers become too busy to respond to anything and the web site slows or stops working altogether.

The weekend attack was thought to involve as many as 60,000 computers, most of them owned by innocent individuals like you and me. These computers could have been infected through e-mail or by visiting a certain web site, with the virus lying dormant until triggered by a date change or some other timing device. In most cases, the computer owners would be completely unaware they were part of the botnet, perhaps just noticing a slowdown in processing power as their machine devoted resources to the attack.    

Popular web sites, like e-commerce and banking sites, have a lot of experience dealing with denial-of-service attacks and they have sophisticated software designed to identify malicious traffic. Security experts have referred to these attacks as being “noisy”, to distinguish them from the more subtle attempts of individual hackers to infiltrate a web site and hijack confidential information.

Which leads us to the vexing question of why North Korea or anyone else would instigate such a massive attack. Perhaps they were testing the preparedness of the U.S. to cope with an even larger attack that could cripple our military defenses or shutdown economic activity. Perhaps they are just making a statement about the vulnerability of western democracy. Whatever the reason, they certainly got everyone’s attention, and the U.S. government and commerce will redouble their efforts to prevent a repetition.



Thank you for submitting your comment. Your comment will appear on the site after it has been reviewed by site moderators!
Post a Comment:
Name:
Email:
Comments (max 500 characters):

Permalink | Print | Email

Share this article!
Partner with Online Mom Media
Online Mom Media specializes in building powerful communities of influencers! [read on]
Special Twitter Event
Join @theonlinemom this Thursday at 9pm ET as we introduce Thrively, a fun and interactive family web site! #Thrively
[read on]
Join the BUZZ!
Join @theonlinemom and friends this Friday at 12 noon PT as we look at Simplifying Mobile Tech. Great prizes! #VZWBuzz [read on]
The Online Mom Blog
Connecting Your Mobile Lifestyle
[read on]
Cómo encontrar en línea las mejores ofertas
Visite La Online Mom en Español! [read on]
Stacey Ross on The Online Mom
Catch up on the digital lifestyle with Stacey Ross!
[read on]
PlayStation 4 vs. Xbox One: Parental Controls
Which of the new gaming consoles offers better parental supervision? [read on]
How To Make the Most of Those Daily Deals
Take a closer look at those daily deals to make sure you're getting a bargain!
[read on]
Watch Out! Your Wristband Is Tracking You…
New ways to monitor two of the most important elements that factor into our overall health: exercise and sleep [read on]
How To Beat Spam with Disposable E-Mail Addresses
There's an alternative to giving out your online information (or turning into a digital recluse): the disposable e-mail!
[read on]
Managing Your Online Reputation
There are some simple steps we can take to safeguard our online reputations [read on]
7 Apps for Finding Stuff Online
Loking to buy and sell online? Your smartphone can help!
[read on]
How to Manage Your Cell Phone Bill
Don't be overwhelmed by that cell phone bill. We offer 7 tips that can help [read on]
7 Social Networking Tips for Graduates
About to graduate? It's time to clean up those social networking accounts!
[read on]
The Best Apps for Staying in Shape
10 great apps for turning your smartphone or tablet into your workout buddy! [read on]
7 Steps to Smartphone Safety
Buying that first smartphone for your child? Make safety a top priority!
[read on]
10 Essential Apps for the Busy Mom
Turn your smartphone into your very own personal assistant! [read on]
Tweens and Facebook:
Do you think children under the age of 13 should be allowed on Facebook?

Yes
No
Not Sure




© 2011 the online mom, all rights reserved | site map ABOUT     MEET THE TEAM     CONTACT US     ADVERTISE     PRESS     PRIVACY     LEGAL
As you may have guessed, it is made of titanium and some stainless steel¡ªthe case is titanium and the rolex replica sale is stainless steel. The dial is brown, the watch hands are silver-toned, and there is a date window at the four o¡¯clock position. The sapphire case protects the breitling replica sale from water damage up to 30 meters. Synergy means cooperative action. This replica watches uk combines the best of the old and the new to deliver something uniquely modern. All of the classic elements are there. It has the sleek and stylish dial of the replica watches uk, the concave dot at the 12 o¡¯clock hour, and the Swiss quartz movement. But the Sapphire Synergy has something few breitling replica sale offer, a rubber wristband. Why rubber? Well, it¡¯s not a sport rolex replica sale, so using it outdoors is out of the question. But the informal band gives it a more casual look and feel, which can be quite appealing to the modern male.