INST201 Flashcard Assignment - Week 12

docx

School

Montgomery College *

*We aren’t endorsed by this school

Course

INST201

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by GeneralElk1670

Report
Kevin Pham INST201 Section 0101 Flashcard Assignment: Week 12 Crash Course Prior to Boeing’s MCAS system crashing their 737 MAX jets, Stan Sorscher was aware of the consequences. Boeing developed a plane equipped with software that overrides pilot input. MCAS was kept a secret from Boeing’s pilots and was only mentioned one time. DDoS Attacks on Dyn Dyn faced three DDoS attacks on October 21, 2016, which shut down Internet platforms and services across the globe. Hacker groups Anonymous and New World Hackers said that they were the ones who enacted the attack. Dyn allows users to map an Internet domain name, operating as a DNS provider. How the Dyn DDoS attack unfolded Internet addresses translated by humans are taken and delivered so that routers can move them to their designated destinations. The DDoS attack is presumed to be by someone who hired botnets. The attack was comprised of IoT devices which included DVRs as well as cameras. If one domain was targeted, it can be assumed that the attacker wanted to hurt the owner. Justice Department Announces Charges and Guilty Pleas in Three Computer Crime Cases Involving Significant DDoS Attacks Defendants in the District of Alaska pleaded guilty to operating two botnets that attacked IoT devices. In addition, defendants in the District of New Jersey pleaded guilty to enacting a cyberattack on Rutgers University. A computer collection that infected with malicious software was controlled by White, Jha, and Norman without the permission of any users. IoT devices were attacked by the Mirai Botnet such as cameras, DVRs, and routers. The Navy Installed Touch-screen Steering Systems to Save Money The McCain crashed into a Liberian oil tanker, resulting in the deaths of ten Navy sailors. This is one of the Navy’s worst accidents in years. The Navy dropped a charge for homicide and Sanchez would plead guilty to dereliction of duty. The Navy decided to implement new instructions to avoid these types of disasters. This included a tutorial on the navigation system.
The Untold Story of NotPetya, the Most Devastating Cyberattack in History The war with Ukraine and Russia has given rise to Russian cyberwar tactics. Hacker group Sandworms have been hacking Ukraine’s government such as its organizations and companies. Hackers of the Russian military hijacked Linkos Group’s servers that gave them access to thousands of computers around the world. When NotPeya was released, it was a declaration of cyberwar which was much more chaotic than anticipated. This Is Why Half the Internet Shut Down Today Domain Name Servers, also known as DNS, are like a phone book that makes sure you get to the webpage you desire. Understanding DNS helps us understand how DDoS attacks work. Customers of Dyn faced query latency and delayed zone propagation, which the company they announced. Websites that users had trouble accessing include the following: CNN, Etsy, Github, Imgur, PayPal, and Spotify. Who is Anna-Senpai, the Mirai Worm Author? Those who launched the Mirai attack launched another attack under the name “Anna- Senpai”. This released copycat attack armies all over the Internet and breached the source code for Mirai. IoT botnets went under various names which allowed for the infection of new systems similar to Internet worms. ProxyPipe was attacked with a 300gbps DDoS that was enacted by lelddos. It was comprised of the taunting of victims on Twitter. Rolling Blackouts People from the 1980s realized that blackouts were inevitable when owning an electrical system. This caused for people to repent the construction of new transmission lines and power plant. This would become a problem for utilities who could need meet demands. Rolling blackouts only affected a small amount of people at a time Things Fall Apart David-Beese's equipment had been severely damaged which could prove bad if there were to be a nuclear disaster. 20 percent of the United States’ power is derived from the hundreds of pressurized water reactors. Nuclear power plants get old and eventually break down which could result in disaster. Even the “young” plants begin to fall apart. Opinion
Overall, people will find many ways to harm others whether it be physically or digitally. It was interesting to see that DDoS attacks are a way to target people and their computer systems. I believe this reinforces the idea that we need ethical hackers in our society that can protect us against these attacks. We can see through the Ukraine and Russia war, that it can cause severe damage and give a country the upper hand. It truly demonstrates how dangerous cyberattacks can be. Questions How did we discover the power of nuclear power plants and how have they developed over the years?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help