Preview

spam and cyber attacks

Good Essays
Open Document
Open Document
972 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
spam and cyber attacks
Dealing With Spam and Cyberattacks: Control vs. Openness
Posted: 04/02/2013 9:11 pm
Follow

United Nations , Internet , Internet Governance Forum , Cyberattack , Cyberbunker ,Spam , Spamhaus , Technology News

SHARE THIS STORY
9
43
1
Submit this story
Back in the early '90s, then Vice President Al Gore spoke of the Internet as an "information superhighway." While that's a somewhat imperfect analogy, the Internet and highways do have some things in common. Both can move traffic and both can become too clogged up for traffic to move swiftly.
A traffic jam on a real highway can affect that road and any other roads that connect to it and the same can be true for the information highway.
And while most traffic jams are a result of an accident or too many vehicles (or data packets in the case of the Internet) legitimately trying to get from place to place, they can also be slowed down deliberately, as happened in Brussels last September when about 100 trucks slowed traffic entering the city as part of a planned protest.
Last week, a small Dutch Internet service provider called CyberBunker initiated a traffic jam of its own. Its apparent goal wasn't to slow down the entire Internet but to bring down the services of Spamhaus -- a spam fighting organization that had added CyberBunker to its block lists for allegedly allowing its customers to send spam around the world. CyberBunker advertises that customers "are allowed to host any content they like, except child porn and anything related to terrorism. Everything else is fine."
According to published reports, that traffic jam affected servers around the world and impacted ordinary people thousands of miles away who weren't able to watch online video or access other Web services as a result of a protest on another continent.
It's a scary thought and a reminder of how this "global village" we live in is so interconnected that we can no longer afford to ignore problems that affect "other people," because they

You May Also Find These Documents Helpful

  • Better Essays

    The Internet society believe that the Internet should be used by everyone freely, meaning that the number one objective is to promote the development, security and stability of the World Wide Web. Malicious attacks such as viruses, spams, spyware and other viscous attacks on hardware and software have become well known wide spread through the web. These attacks often result in irreparable damage and abuse the very freedom the Internet principles were based on (Internet security," 2012).…

    • 1786 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    In order to protect their economic interests, many ISPs have introduced illegal or harmful practices to the Internet, especially traffic shaping. For example, ISPs try to prevent users from using wireless routers, using VOIP, file sharing programs, slowing down video and TV sites, file sharing, and so…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ecommerce - case study

    • 312 Words
    • 2 Pages

    countries have refused to give ISPs in their country to host their site. They have law suits against…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Sullivan, Scott. "Policing the Internet." The FBI Law Enforcement Bulletin. June 1999. Expanded Academic Index. February 25, 2001.…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    Kelly A. Gable, Cyber-Apocalypse Now; securing the internet Against Cyberterrorism and using Universal Jurisdiction and a Deterrent, 43 Vand. J. Transnat’l L. 57 (2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    According to Cassim, “Cyber Terrorism is defined as a premeditated use of disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in the furtherance of such objectives” (p384). Cyber space is considered the best place for criminals and their peers to gather and discuss their next move (Cassim2012). With technology on the rise, the web has become the prime place for fights to break out, but not all cyber threats are necessarily terrorism…

    • 2227 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers data stored on the system or the person working on the system itself. Security experts has documented "67,000 new malware threats on the Internet daily in the first quarter of 2011, resulting from more than 45 new viruses, worms, spyware and other threats" (Department of Commerce (DOC), 2011). Malicious traffic plays a key role in the challenges faced in the economics of information security. Economically speaking, malicious traffic…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Threats

    • 1222 Words
    • 4 Pages

    Every day advances in technology happen. In the last few decades, computer technology has advanced past many technological barriers. Almost every aspect of everyone’s life has some dealing with computers in it. With all this being said, computer cyber threats are on a rise in every economy in the world. Cyber threats in America, have caused the government to try and control American internet access, have cost American’s a lot of money, and have everyone worried about the many infrastructures that are ran by the cyberspace, from being attacked.…

    • 1222 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    Raymind, A. (2011, January 19). Bit-defender 's 2011E-Threat Predictions Spotlight DDoS Protests, Rogue Applications, Social Network Plug Ins, and Mobile Malware. World Market Media. Retrieved January 22, 2011, from World Market Media Web site: http:/ / worldmarketmedia.com…

    • 2198 Words
    • 9 Pages
    Best Essays
  • Better Essays

    The Internet is a battleground where fights for technical, social, and political control are waged, including between governments and their citizens, separate governments, and competing commercial interests. These fights take many forms, including Internet filtering versus circumvention, surveillance versus anonymization, denial of service attacks and intrusion attempts versus protection mechanisms, and on- and offline persecution and defense of online activists. These battles impact and are impacted by the Internet 's technical structure. As the Internet continues to embed itself into our world, its structural changes will have an increasing effect on our social and political structures, and our social and political structures will have increasing impact on the Internet 's technical structure. (IEEE Computer Society 2013)…

    • 2072 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Goldsmith, J. L., & Wu, T. (2006). Who controls the Internet?: Illusions of a borderless world. Cary, NC: Oxford University Press.…

    • 1974 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Traffic Jam in Bangladesh

    • 1050 Words
    • 5 Pages

    (a) City lay-out (master plan) and over-population: The causes of traffic congestion in Dhaka city are multifarious. Starting from the city itself, it is observed that the skeleton, structure and lay-out of Dhaka City are not well-planned and well-directed. Dhaka is also a highly populated city. More than one crore people live here and the figure is increasing day by day. This huge population acts as an auto-catalyst of traffic congestion in Dhaka City.…

    • 1050 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Traffic Jam

    • 502 Words
    • 3 Pages

    Ever had to sit in a traffic jam with absolutely nothing to do? I can almost bet you have!They are inevitable and can sneak up on you anytime, catching you unawares and unprepared.…

    • 502 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Transport Congestion

    • 294 Words
    • 2 Pages

    Traffic research still cannot fully predict under which conditions a "traffic jam" (as opposed to heavy, but smoothly flowing traffic) may suddenly occur. It has been found that individual incidents (such as accidents or even a single car braking heavily in a previously smooth flow) may cause ripple effects (a cascading failure) which then spread out and create a sustained traffic jam when, otherwise, normal flow might have continued for some time longer.…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cybercrime And Its Impact On

    • 1541 Words
    • 11 Pages

    Cybercrime and its Impact on New Media and Discourse Robert M. Hayes, Professor Emeritus, UCLA Information Technology and Journalism Conference Dubrovnik, Croatia 24 May – 28 May 2010 My Website  http://polaris.gseis.ucla.edu/rhayes/courses/courses.htm  This PowerPoint presentation is available at that site. Simply click on “Other” and it is the first entry there.…

    • 1541 Words
    • 11 Pages
    Satisfactory Essays