Editing 932: CIA
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 12: | Line 12: | ||
This comic is a reference to the attacks by a group briefly known as {{w|LulzSec}}, which was a splinter group from the internet community known as {{w|Anonymous (group)|Anonymous}}, also featured in [[834: Wikileaks]]. In the back of the news report in frame one is the logo that was used by LulzSec. The group was able to publicize several high profile attacks. They were able to briefly take down the CIA website using a DDoS attack. {{w|DDoS}} stands for Distributed Denial of Service in which the attacker uses many computers to send traffic to a host and render it incapable of answering requests from any other computer, effectively taking the site down. | This comic is a reference to the attacks by a group briefly known as {{w|LulzSec}}, which was a splinter group from the internet community known as {{w|Anonymous (group)|Anonymous}}, also featured in [[834: Wikileaks]]. In the back of the news report in frame one is the logo that was used by LulzSec. The group was able to publicize several high profile attacks. They were able to briefly take down the CIA website using a DDoS attack. {{w|DDoS}} stands for Distributed Denial of Service in which the attacker uses many computers to send traffic to a host and render it incapable of answering requests from any other computer, effectively taking the site down. | ||
β | This comic is pointing out the difference between what | + | This comic is pointing out the difference between what lay-people ([[Ponytail]]) and the computer expert ([[Megan]]) hear when seeing a story like this. Most people may think there is no boundary between the CIA website and its internal network, and conclude hackers compromised the USA intelligence service's most precious data, which would be an incredible display of incompetence by the CIA and would have some pretty obvious negative side effects for CIA assets around the world. |
Computer experts, on the other hand, may compare the CIA website to a company's poster, so the damage done is much different and less harmful: the CIA's public relation capacities are hindered for a few hours. The damage from a DDoS is less a catastrophic compromise of valuable federal databases, and more like flash mob crowding in the lobby of the CIA offices, making life mildly inconvenient. | Computer experts, on the other hand, may compare the CIA website to a company's poster, so the damage done is much different and less harmful: the CIA's public relation capacities are hindered for a few hours. The damage from a DDoS is less a catastrophic compromise of valuable federal databases, and more like flash mob crowding in the lobby of the CIA offices, making life mildly inconvenient. |