What are the implications of an attack on bgp

Assignment Help Computer Engineering
Reference no: EM133472870

Assignment

On October 4, 2021, at 15:39 UTC, the social network Facebook and its subsidiaries, Messenger, Instagram, WhatsApp, Mapillary, and Oculus, became globally unavailable for a period of six to seven hours.

Read the article "What is BGP, and what role did it play in Facebook's massive outage by Mitchell Clark (Oct 5, 2021)

Question A. What types of attacks is Border Gateway Protocol (BGP) susceptible to?

Question B. What are the implications of an attack on BGP? What might be disrupted?

Question C. With respect to the article mentioned above, discuss why you support (or reject) the claim that Facebook goofed up its BGP routes, which prevented its DNS servers from finding all of its applications and services.

Question D. BGP is old and may be imperfect, but it is the best system we have that makes the Internet work. With respect to the article mentioned above, discuss why you support (or reject) the claim that Facebook should be blamed for messing up a routine system update.

Reference no: EM133472870

Questions Cloud

Should there be an upper age restriction for president : Should there be an upper age restriction for the role of president
Explain a new technology that the business should deploy : Explain a new technology that the business should deploy. Be specific, don't only note the type of technology but the specific instance of technology.
Limited liability business forms are generally created : Limited liability business forms are generally created by the government.
Discuss or worry about emergency rules : Is the rule by the FDA valid? Why or why not? In your answer, don't discuss or worry about "emergency rules", but just stick to what we have learned.
What are the implications of an attack on bgp : What types of attacks is Border Gateway Protocol (BGP) susceptible to? What are the implications of an attack on BGP? What might be disrupted?
Identify non profit formation and maintenance statutes, : Identify non profit formation and maintenance statutes, regulations, and agency guidance in the state of Hawaii.
Identify the technical or professional problem in the case : Identify the technical/professional problem in the case. What recommendations can you make about the problems in the case based upon your ethical analysis?
What wage and work hour protections exist for employees : What wage and work hour protections exist for employees today? Identify and explain at least three and provide which you believe is most important and why.
Identify the purpose of the current u.s. hcds : Identify the purpose of the current U.S. HCDS - Describe the population served by the U.S. HCDS - Discuss the projected healthcare needs of the U.S.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Analyze how the information could be applied in the future

Project Assignment: REPORT GUIDELINES. Analyze What your learned from this project and how the information could be applied in the future.

  Algorithm for generating list of customers

Develop an algorithm in order to generate a list of customers from Glad Rags Clothing Company’s customer master file.

  Write security planinig doucument for computer science

Write security planinig doucument for computer science department.

  Take an input argument of r0 holding the address

Write a subroutine called TOLOWER. This takes an input argument of R0 holding the address of aproperly terminated string.

  Write a short explanationof each concept and be prepared

Write a short explanation (two to three sentences) of each concept and be prepared to discuss it with the class.

  How long would it take the rover to transmit the pictures

Suppose NASA takes several pictures of the martian surface and wants to transmit them back to Earth. The total size of the pictures is 50 MB.

  Compute the output of a sigmoid neuron

Write out Equation a′=σ(wa+b). in component form, and verify that it gives the same result as the rule 4 for computing the output of a sigmoid neuron.

  What are the penalties for illegally copying software

What are the penalties for illegally copying software? Are there circumstances under which it is acceptable to copy a program?

  Determine what should be done about the various incidents

Your boss mentions that recently a number of employees have received calls from individuals who didn't identify themselves and asked a lot of questions.

  What is the function of cross-layer mac in wsn

What is the function of cross-layer MAC in WSN? What are the benefits of the cross layer MAC and is it suitable for mesh topology in WSN?

  Construct a process-flow diagram using given information

Construct a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario.

  Describe one characteristic and boundary of the ecosystem

Ecosystem boundaries are often difficult to define with precision. The location and productivity of the producers that support your ecosystem.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd