Preview

Software Engineering

Powerful Essays
Open Document
Open Document
1213 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Software Engineering
Ermack B. Verzel June 26, 2013

Assignment Software Engineering

1. As software becomes more pervasive, risks to the public (due to faulty programs) become an increasingly important concern. Develop a realistic doomsday scenario where a failure of a computer program could do great harm (endanger human life or economies).
Tech doomsday scenario: The Net goes down

News flash: The Internet melted down today as millions of Web surfers found themselves redirected to the wrong sites, thanks to problems with the domain name server system.
Can the Internet be taken offline? Many experts scoff at the idea, citing too many diverse communications channels, too many redundancies, and architecture designed to route around failures.
"I think it would be very difficult to take down the whole Internet, unless you had a worldwide EMP event that takes everything else down as well," says Dr. Ken Calvert, chair of the University of Kentucky's Department of Computer Science. "At all levels you have diversity of technology carrying the bits, whether it's satellite, fiber, or wireless. There's a lot of redundancy there."
Yet even if the Net can't be entirely shut off, short of an act of God (see Tech doomsday scenario No. 5), attackers can create havoc by attacking it at one of its weakest points: the domain name system. By hijacking traffic meant for different domains, attackers can drive unsuspecting surfers to malicious sites, effectively take down any site by flooding it with traffic, or simply send everyone looking for Google.com or Yahoo.com into the ether -- making the Net largely useless for a great many people.
"Everybody trusts the DNS, but it's not really trustworthy," says Rod Rasmussen, president and CTO for anti-phishing services firm Internet Identity. "The system itself isn't well protected. And all you need are a name and a password to take out a DNS server or a particular domain."
Attackers don't even need to attack DNS servers or poison their

You May Also Find These Documents Helpful

  • Good Essays

    The Domain Name System is a classified identification system for processors of any source joining in the Internet. It connections numerous evidence with domain terms allocated to such applicants. Most essentially, it interprets domain names significant to individuals into the numerical identifiers related with networking equipment for the resolution of finding and addressing these procedures world-wide. A frequently used similarity to clarify the Domain Name System is that it helps as the phone book for the Internet by interpreting human-friendly computer hostnames into IP addresses.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Leiner, B., Cerf, V., Kahn, R., & Clark, D. (1962-1974). Brief history of the internet. Retrieved from http://www.internetsociety.org/internet/internet-51/history-internet/brief-history-internet…

    • 1786 Words
    • 8 Pages
    Better Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Domain tasting had a negative impact on the domain market by eroding consumer confidence in the system. Those who wanted to register names that were tasted and then let go, or those that saw their trademarks usurped during a tasting campaign… all were adversely impacted by domain tasting. The activities were also populating the internet with many useless sites. Sites full of advertisements, and useless information. These practices also had other negative effects for Internet users. Increasingly, domain registrants are serving malware to visitors who accidently visit their domains or sent there by spam, DNS poisoning, or other tactic. Malware comes in many forms, but typically, it steals personal information and money from the visitor. By remotely directing, malware can turn a person’s computer in a bot, or worse.…

    • 2375 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Huhuhu

    • 1690 Words
    • 7 Pages

    DNS servers maintain a database containing IP addresses mapped to their corresponding domain names. To access a computer on the Internet, users need only specify its domain name.…

    • 1690 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Software Engineering

    • 2867 Words
    • 12 Pages

    Any coherent and reasonable project must have some requirements that define what that project is supposed to do. The requirements are the basic steps in implementing a project. A requirement is an objective that must be met. There are several types of requirements such as price, performance and reliability objectives. Requirements are instructions describing what functions the project is supposed to provide, what characteristics the project is supposed to have, and what goals the project is supposed to meet. The shortage of requirements causes many problems in starting and implementing a project. This law states that this shortage of requirements is the main source in the failure of the project.…

    • 2867 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Software Engineering

    • 985 Words
    • 4 Pages

    I have many goals in mind for my life. I want to graduate university, possibly go to graduate school, and obtain a career in which I am happy and satisfied. Yes, I know this sounds very cliché as many people want to obtain this kind of life. I don’t mind obtaining a “normal” happy life as long as I am happy with it. I am familiar with Maslow’s Hierarchy of Needs and I want to make sure I fulfill my lower needs before I start trying to achieve my goals. I have never actually applied the GIOADA process to my decision making in the past. After reading the document that describes the GIOADA process, I will start applying this process to future decisions I make in life. Also, as I look back at some of the big decisions I made previously, I wish I applied the GIOADA process in making these decisions. That would have allowed me to more strongly analyze all the processes of the decision making.…

    • 985 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Why Warfare Is Wrong

    • 764 Words
    • 4 Pages

    The internet is a vast zone where the impossible transforms into the possible. Few can manipulate the internet and use it to cause harm. On August 15, 2012, the world witnessed the largest internet attack on Saudi Aramco, one of the world's largest oil companies. The attack caused "35,000 computers to be wiped or totally destroyed and every office was physically unplugged from the Internet to prevent the virus from spreading further" (Plagiary). The attack caused the entire company, that supplies 10% of the world's oil supplies, to shut down. Multiple companies in Saudi Arabia got denied oil. The effects of the attack fell instantly as shortages of oil, caused riots that injured thousands in the Middle East. The individuals who carried out the attack on Saudi Aramco didn't have to pick up a weapon or annihilate them with bombs to cause a huge blow to the company or to harm those estimated 1,100 souls that who were critically injured in the…

    • 764 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Internet is a very useful source for many things. It has almost become a way of life for some people It has faded out things such as post offices, shopping malls and even telephones to some extent. So since it has become such an asset in peoples lives then should there be laws to prevent chaos on the Internet?…

    • 480 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Q3- Identify the features of the Internet that make it unlikely to stop working from a single point of failure. Why do you think the internet has such as high degree of redundancy?…

    • 669 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    History of the Internet

    • 1470 Words
    • 6 Pages

    The Internet is a vast network of computers and other mini-networks all linked together so that everyone can find information, purchase products, or meet new people. It is easily assessable from home for anyone that has a computer and a modem or at a local library. It has made a huge impact since its introduction to the public and now some people cannot see life without it. It is also relatively new considering it was just about 10 years ago that it was made public and easily accessible to everyone thorough online services. This paper will describe the history of the Internet.…

    • 1470 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    It also would be practically impossible to control the internet from a government standpoint. The government cannot control what the world has access to view or add to. With no other reasonable options, society must trust in the good judgment of internet users. It is the responsibility of such users to avoid accessing improper information. There would have to be many people working around the clock to be setting up firewalls, and other security measures for the time we live in there are hackers just looking for a new challenge. The government could try to set up a firewall to block inappropriate things but it is a bit to advance for the technology we have right now.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Software Engineering

    • 769 Words
    • 4 Pages

    Assumptions provide presumed real world facts that systems are guaranteed to operate correctly. Although software processes have existed for many years now, domain knowledge should be applied throughout every phase of the software development process. An appreciation of the assumptions underlying software engineering can lead to a better understanding of the applicability of structure and quality of work produced. Software plays an important role in business decision-making, and because of its growing importance, assumptions should not be excluded. Its seems increasingly clear that unorganized structures can be a problem in software requirements. What determines whether these problems are important in our decision-making? In business sense, we should focus more on improving the quality of decisions by linking problem solving and decision-making. This paper examines major assumptions in the real world and how they affect decision-making in environmental behavior. This paper also identifies limitations that may arise from these assumptions and how the implementation approach is incorporated in the software development of architecture and tools. In addition, I will explain where we are headed in Software Engineering.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Undersea Cables

    • 642 Words
    • 2 Pages

    When thinking about where the internet lives, it would be plausible to think it lies among high-tech satellites communicating around the world simultaneously – resembling something of a digital cloud. Instead, the internet does not resemble a cloud, but instead resides in a physical infrastructure in hundreds of cables snaking underground and along the bottom of the sea. In fact, overseas satellite links currently account for only roughly 2 percent of international traffic, while the remainder is carried by undersea cable (Source 1). The reliability of these cables is high, and the carrying capacity of undersea cables is multiple times higher than that of a satellite. As a result of their usefulness, they have become highly valued by the largest corporations and also national governments.…

    • 642 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Software Engineering

    • 537 Words
    • 3 Pages

    A systems analyst combines knowledge of information systems and business to develop computer systems that will meet business needs. The job is among the most advancedcomputer careers because of your need to be able to think strategically and to interact with professionals with a variety of skill sets. This career is the TopTenREVIEWS Bronze Award winner in computer careers.…

    • 537 Words
    • 3 Pages
    Good Essays