Skip to main content

Home/ IB ITGS/ Contents contributed and discussions participated by Chalana Perera

Contents contributed and discussions participated by Chalana Perera

Chalana Perera

Strategic Impact of Cyber Attacks (IRL Estonia) - 0 views

  •  
    This article discusses the Russian cyber-attacks on Estonia and how it affected the country and what the country did to "Counter-attack" and prevent further attacks. It features several different opinions on cyber-attacks.
Chalana Perera

Cyber-attack Trends in US Corporations - Statistics (Biz Forum) - 1 views

  •  
    This document gives an in-depth analysis into the impacts on US Corporations and non-government businesses/private firms and contractors. It includes many statistics and reviews as well as collected data from a variety of sources.
Chalana Perera

US plans for cyber attacks (News24) - 1 views

  • disabled US cell phone networks, slowed internet traffic to a crawl and crippled America's power grid
  • stealth cyber attack and a pair of bombings, cutting electricity to tens of millions of homes.
  • has the authority to use the full powers at his disposal
  •  
    This article discusses the simulated cyber "shockwave" exercise that was carried out in Washington DC as to practice in preparation for predicted cyber-attacks against the US. It looks at the impacts on power systems, politics and the use of military intervention.
Chalana Perera

(J) What Is a Cyberattack? (WiseGeek) - 1 views

  • without the knowledge or consent of the owner of the equipment
  • main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or serve
  •  
    This article goes in depth about the technology, hardware and software of cyber-attacks and discusses what is technically qualified as a cyber-attack and what isn't. It also discusses the different impacts that different attacks have and the different methods of attacking.
Chalana Perera

Protect the U.S. from cyber attacks (The Hill) - 0 views

  • technological fixes to this challenge may be easier to solve than the underlying policy questions
  •  
    This article looks at some technological possibilities that would help prevent and prohibit extensive cyber-attacks.
Chalana Perera

(H) Security experts say Google cyber-attack was routine (BBC) - 0 views

  • hackers got very limited information
  • phishing
  • Once an e-mail account is compromised, attackers can piggyback on it to get access to confidential files and systems throughout an organisation.
  •  
    This article discusses some minor impacts on a few stakeholders but goes well into detail about the IT features and explains the technology and methods involved in cyber-attacks.
Chalana Perera

Economic Impacts of Cyber-Attacks (CISCO) - 0 views

  •  
    This PDF is a report that discusses research into the economic impacts of cyber-attack on private, small-scale, large-scale, multinational, local and international corporations as well as government financial institutions.
Chalana Perera

Debate over possible responses to cyber attacks (MSNBC) - 0 views

  • the U.S. military's secret offensive cyber capability
  • counterstrike on an attacker's computer network
  •  
    This article discusses the idea of a cyber-war and promotes tit-for-tat solutions and counter-attack strategies that the US could use in a cyber war. It also discusses some short term solutions for small-scale cyber attacks.
Chalana Perera

Experts work to untangle cyber attacks (MSNBC) - 0 views

  • zombie’ computers
  • hackers may have simply used zombie computers
  • digital battlefield
  • ...7 more annotations...
  • 100,000 zombie computers linked together in a network known as a "botnet."
  • basic hack job
  • blizzard of digital requests
  • federal government is still very vulnerable in terms of its cyber security and that agencies have miles to go to plug the holes.
  • intrusion problem."
  • fast-spreading e-mail worm from 2004 called "MyDoom
  • malware also appears to contain a destructive Trojan designed
  •  
    This article discusses the US ad South Korean research into suspected cyber attacks from North Korea on private and govt websites in the two countries. It discusses the programs used, the impacts and effects and how the attack takes place from one computer, creates a network through botnets and installs malware into thousands of computers which then send repeated requests, simultaneously to the same website, attacking it.
Chalana Perera

OLPC For You and Me | Things Are Good - 0 views

  • The cost of the machine has unfortunately increased from their proposed $100 USD to almost double that, in oprder to ensure that they can still get these laptops out to the kids they are selling them as pairs.
Chalana Perera

The Fonly Institute: Problems with the $100 laptop - 0 views

  • Distribution problems
  • Hardware issues – power generation
  • Hardware issues – mesh networking
  • ...3 more annotations...
  • What if each child had a smartphone or a netbook
  • When they have, connection is too slow to work properly in class-time. Wireless signal it is not strong enough, so they can't connect from home
  • it has not been generally validated as bringing about new paradigms of child learning
1 - 20 of 75 Next › Last »
Showing 20 items per page