Preview

Software Engineering

Powerful Essays
Open Document
Open Document
1213 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Software Engineering
Ermack B. Verzel June 26, 2013

Assignment Software Engineering

1. As software becomes more pervasive, risks to the public (due to faulty programs) become an increasingly important concern. Develop a realistic doomsday scenario where a failure of a computer program could do great harm (endanger human life or economies).
Tech doomsday scenario: The Net goes down

News flash: The Internet melted down today as millions of Web surfers found themselves redirected to the wrong sites, thanks to problems with the domain name server system.
Can the Internet be taken offline? Many experts scoff at the idea, citing too many diverse communications channels, too many redundancies, and architecture designed to route around failures.
"I think it would be very difficult to take down the whole Internet, unless you had a worldwide EMP event that takes everything else down as well," says Dr. Ken Calvert, chair of the University of Kentucky's Department of Computer Science. "At all levels you have diversity of technology carrying the bits, whether it's satellite, fiber, or wireless. There's a lot of redundancy there."
Yet even if the Net can't be entirely shut off, short of an act of God (see Tech doomsday scenario No. 5), attackers can create havoc by attacking it at one of its weakest points: the domain name system. By hijacking traffic meant for different domains, attackers can drive unsuspecting surfers to malicious sites, effectively take down any site by flooding it with traffic, or simply send everyone looking for Google.com or Yahoo.com into the ether -- making the Net largely useless for a great many people.
"Everybody trusts the DNS, but it's not really trustworthy," says Rod Rasmussen, president and CTO for anti-phishing services firm Internet Identity. "The system itself isn't well protected. And all you need are a name and a password to take out a DNS server or a particular domain."
Attackers don't even need to attack DNS servers or poison their

You May Also Find These Documents Helpful

  • Good Essays

    The Domain Name System is a classified identification system for processors of any source joining in the Internet. It connections numerous evidence with domain terms allocated to such applicants. Most essentially, it interprets domain names significant to individuals into the numerical identifiers related with networking equipment for the resolution of finding and addressing these procedures world-wide. A frequently used similarity to clarify the Domain Name System is that it helps as the phone book for the Internet by interpreting human-friendly computer hostnames into IP addresses.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Q3- Identify the features of the Internet that make it unlikely to stop working from a single point of failure. Why do you think the internet has such as high degree of redundancy?…

    • 669 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Approximately 3.2 billion people use the internet each day. It is estimated that if the internet were to stop operating for one day 200 billion emails and 3 billion Google searches would be delayed. Internet usage has grown substantially over the years due to advances in technology. The internet is a useful resource that provides rapid information and also provides multiple social networking devices. Although the internet is meant to connect people, it is doing the opposite.…

    • 808 Words
    • 4 Pages
    Good Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Domain tasting had a negative impact on the domain market by eroding consumer confidence in the system. Those who wanted to register names that were tasted and then let go, or those that saw their trademarks usurped during a tasting campaign… all were adversely impacted by domain tasting. The activities were also populating the internet with many useless sites. Sites full of advertisements, and useless information. These practices also had other negative effects for Internet users. Increasingly, domain registrants are serving malware to visitors who accidently visit their domains or sent there by spam, DNS poisoning, or other tactic. Malware comes in many forms, but typically, it steals personal information and money from the visitor. By remotely directing, malware can turn a person’s computer in a bot, or worse.…

    • 2375 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Huhuhu

    • 1690 Words
    • 7 Pages

    DNS servers maintain a database containing IP addresses mapped to their corresponding domain names. To access a computer on the Internet, users need only specify its domain name.…

    • 1690 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Software Engineering

    • 2867 Words
    • 12 Pages

    Any coherent and reasonable project must have some requirements that define what that project is supposed to do. The requirements are the basic steps in implementing a project. A requirement is an objective that must be met. There are several types of requirements such as price, performance and reliability objectives. Requirements are instructions describing what functions the project is supposed to provide, what characteristics the project is supposed to have, and what goals the project is supposed to meet. The shortage of requirements causes many problems in starting and implementing a project. This law states that this shortage of requirements is the main source in the failure of the project.…

    • 2867 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    The Internet has been designed as a ‘pool of endless information’ for anyone who has access. With its introduction in the mid 1990’s, it has vastly changed the way we do business, obtain all kinds of data and the way we communicate in the world today. With its sheer potential, we have created the most powerful tool of our modern day technology. In a series of memos that were first written in 1962, by an MIT expert of the name of J.C.R Licklider, he had envisioned a type of ‘network’ in which a set of computers were globally interconnected in sharing information and anyone could access data from anyone of these terminals (Leiner, Cerf, Kahn & Clark, 1962-1974).…

    • 1786 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The internet, from its inception, was designed to be a platform for the exchange of information. Originating from the public sector as the ARPANET, the internet truly came into its own after being opened up to the private sector. Countless benefits – instant access to communication, information, and entertainment systems have revolutionized the world in a manner that has not been seen since the industrial revolution. With all major societal shifts, though, come a host of new social and political problems that must be solved through one means or another, with the internet being no different. The latest among these issues is whether or not there should be a neutral net – in this country, and abroad.…

    • 960 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Software Engineering

    • 985 Words
    • 4 Pages

    I have many goals in mind for my life. I want to graduate university, possibly go to graduate school, and obtain a career in which I am happy and satisfied. Yes, I know this sounds very cliché as many people want to obtain this kind of life. I don’t mind obtaining a “normal” happy life as long as I am happy with it. I am familiar with Maslow’s Hierarchy of Needs and I want to make sure I fulfill my lower needs before I start trying to achieve my goals. I have never actually applied the GIOADA process to my decision making in the past. After reading the document that describes the GIOADA process, I will start applying this process to future decisions I make in life. Also, as I look back at some of the big decisions I made previously, I wish I applied the GIOADA process in making these decisions. That would have allowed me to more strongly analyze all the processes of the decision making.…

    • 985 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Why Warfare Is Wrong

    • 764 Words
    • 4 Pages

    The internet is a vast zone where the impossible transforms into the possible. Few can manipulate the internet and use it to cause harm. On August 15, 2012, the world witnessed the largest internet attack on Saudi Aramco, one of the world's largest oil companies. The attack caused "35,000 computers to be wiped or totally destroyed and every office was physically unplugged from the Internet to prevent the virus from spreading further" (Plagiary). The attack caused the entire company, that supplies 10% of the world's oil supplies, to shut down. Multiple companies in Saudi Arabia got denied oil. The effects of the attack fell instantly as shortages of oil, caused riots that injured thousands in the Middle East. The individuals who carried out the attack on Saudi Aramco didn't have to pick up a weapon or annihilate them with bombs to cause a huge blow to the company or to harm those estimated 1,100 souls that who were critically injured in the…

    • 764 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Internet is a very useful source for many things. It has almost become a way of life for some people It has faded out things such as post offices, shopping malls and even telephones to some extent. So since it has become such an asset in peoples lives then should there be laws to prevent chaos on the Internet?…

    • 480 Words
    • 2 Pages
    Good Essays
  • Best Essays

    References: Abeles, T.P. (2001). The Impact of Globalization. On the Horizon, 9(2), pp 12 – 14.…

    • 1577 Words
    • 7 Pages
    Best Essays
  • Better Essays

    History of the Internet

    • 1470 Words
    • 6 Pages

    The Internet is a vast network of computers and other mini-networks all linked together so that everyone can find information, purchase products, or meet new people. It is easily assessable from home for anyone that has a computer and a modem or at a local library. It has made a huge impact since its introduction to the public and now some people cannot see life without it. It is also relatively new considering it was just about 10 years ago that it was made public and easily accessible to everyone thorough online services. This paper will describe the history of the Internet.…

    • 1470 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Software Engineering

    • 537 Words
    • 3 Pages

    A systems analyst combines knowledge of information systems and business to develop computer systems that will meet business needs. The job is among the most advancedcomputer careers because of your need to be able to think strategically and to interact with professionals with a variety of skill sets. This career is the TopTenREVIEWS Bronze Award winner in computer careers.…

    • 537 Words
    • 3 Pages
    Good Essays