Sunday, May 10, 2009

Midterm question #3

Internet if properly maximized can be used as a medium to the advantage of the company. However, risks and threats are there. Thus, research the following:

1. Identify the possible risks and threats (eg. virus) that can potentially attack a company with internet connection.

- When hackers recently targeted the backbone of the Internet, they caused little damage. But the attempt underscores the risks associated with our reliance on the Web. A virus is a man-made computer program that infects a file or program on our computers. Each time the infected program is run, the virus is also triggered. It spreads itself by infecting other programs on the same computer.

viruses and worm, trojan horses, rootkits, crackers and hackers, spam, Web bugs, child security, Pop-up

2. Case research and analysis:

-
Over a decade of work on the computer virus problem has resulted in a number of useful scientific and technological achievements. The study of biological epidemiology has been extended to help us understand when and why computer viruses spread. Techniques have been developed to help us estimate the safety and effectiveness of anti-virus technology before it is deployed. Technology for dealing with known viruses has been very successful, and is being extended to deal with previously unknown viruses automatically. Yet there are still important research problems, the solution to any of which significantly improve our ability to deal with the virus problems of the near future. The goal of this paper is to encourage clever people to work on these problems. To this end, we examine several open research problems in the area of protection from computer viruses. For each problem, we review the work that has been done to date, and suggest possible approaches. There is clearly enough work, even in the near term, to keep researchers busy for quite a while. There is every reason to believe that, as software technology evolves over the next century or so, there will plenty of important and interesting new problems that must be solved in this field.

a. Identify one company that had experienced an attacked from the internet.

- On Thursday, Microsoft blamed a two-hour outage of its major Web sites on network attackers who apparently flooded key systems with extraneous requests for data. The previous day, the giant pointed to a technical error as the cause of a nearly 24-hour blackout of the same sites--sites that have made Microsoft the No. 3 powerhouse of Web content.

-A denial-of-service attack overloads a site's servers with a flood of data, effectively blocking legitimate Web surfers from accessing the site. In this case, the attack was aimed not at the servers, but at the hardware switches that route data to the Web sites--the "single point of failure" pointed out by experts. By flooding these routers with bogus requests for Web pages, the hacker ensured that legitimate requests for pages could not be processed by Microsoft's servers.

b. Describe the attack


The attack - by what is known as a computer "worm" - has interfered with web browsing and e-mail delivery.

-it will slowdown the internet
-it will automatically shut downs your computer
-it will breakdown your PC

c. Identify the damages done and the solutions adopted to reverse the damages and to protect the company from future threats.

-the damages that might cause by the viruses of a computer or the risk and threats.
- The files of the computer might be automatically deleted by the virus or worst all the files of the computer will no longer exist in your P.C. and sometimes you cannot detect the virus it will simly shut downs your computer without touching it, the possible solution in this kind of problem is by putting a licensed anti virus in ur P.C or making a back-up for your files so that if the computer will break down you can reformat it and you will have no worries about your files because you have a back up files or memory disk.

Cite your reference. Google and own explanation

No comments:

Post a Comment