I posted last month about an interesting discovery. I installed a 10g system in a bank setting with the thoughts of quicker response and data flow.
To update the title of my 10 g system I installed in my home. I have to retract the 10g it was an error in my typing skills. It is not 10g it is a 1g system I installed in my home.
I also failed to mention that if your internet provider does not offer the gigabit bandwidth in your area. You might find that they will update there equipment from time to time. Here in my area Sudden Link made a Data and Equipment Merger. Such a mess it caused switching over from outdated slow equipment in both there cable vision and the internet adding more reliable means for the customer to add bundles to their service. Offering automatic upgrade in internet bandwidth like 8 Megs/s to 10Meg/s at no extra charge. This will deliver a more reliable steady stream of information sent to and from your home entertainment and computer devices. With that in mind an investment at the distribution point in our City has to be costly. So the down side is the constant degrading of old wire fed neighborhoods will have to wait for the fiber-optics upgrade that brings us more reliable higher speeds, like the 1 and 10 G service that makes our mouths water. Gamer's you'll still have to wait.
Last weekends switch over left a few disgruntled customers including myself. No internet left me powerless to get any work done. The techs could not get my M T A router to preform as it should. It was getting the information sent yet failed to distribute it past the Ethernet port on the rear of the router. A replacement Router remedied the fault. Now that I have a faster service running over old coax wire along with the more than a capable LAN I installed in my home office and home is working out nicely now. I have a whopping 10Megs feeding my home network. It is not much I know, when you look at my network in comparison to what I can be using. Our area will not support at this time anything over 50 Megs of bandwidth.
I am not an avid Gamer so my needs are not demanding like the Gamer.
I can however stream two movies and run the computer at the same time without or minimum slow downs and stops when streaming now. Yes I tested it, out of concern.
As time moves forward I believe that the new cable company will change and upgrade the old 5 coax cable to a 6. If they use the good stuff like all copper or copper core and aluminum braid. I did see some copper clad stuff, that wont fly for long before they start having trouble with unprotected weather boots over the ends of the cable termination or union.
Wednesday, July 20, 2011
Ken Brewer © July 12, 2011
Many international terrorist groups now actively use computers and the Internet to communicate, and several may use technical skills to direct and coordinated attack s against computers in or homeland or elsewhere in the world. Cyber-attacks intended to harm the economy would likely target computers that operate the civilian aspects of the finical network and or critical infrastructure of government agencies.
How would a well-coordinated cyber-attack against the U.S.’s critical infrastructure be harmful? Would infecting computers operated by and in the civilian critical infrastructure actually offer an effective target terrorist’ goals?
There are three methods for computer attack physical, electronic and cyber. “Some feel that past discussions about a coordinated attack against civilian computers may have been over-inflated that perceived risk to the U.S. critical infrastructure, and several experts have stated that cyber-terrorism does not pose the same type of threat as Nuclear, Biological, or Chemical (NBC) threats”.
Different attack methods target different vulnerabilities and involve different types of weapons. To further discuss a computer attack, and may be defined as actions directed against computer systems is to disrupt equipment operations, control, and corrupt stored data.
A physical attack may come in many forms, however basically different vulnerabilities involve different types of weapons. A physical attack involves conventional weapons directed against a computer facility or its transmission infrastructure.
The DOD argues that a physical attack is unlikely do to the fact in its physical nature. Facilities that would be damaged would suffer to some degree; the long-lasting effect would be limited to such a measure and would be temporary out of commission until reestablishment.
EMP’s electromagnetic pulse device could be considered as a type of physical attack. The EMP is a device that would be more permanent with longer lasting effects. The power overload emitted from a device can put a civilian company or government facility out of order for days, months, or longer, however the stored data will be deleted and unrecoverable.
Cyber-hits, attacks are most common and lay in for an attack against a larger scaled target. Targets may include a local intra-structure of a closed network or as large as worldwide, using the computer to attack itself with an encrypted virus for example.
Reading this you may see a pattern. Physical deployment methods are used at the beginning of each of these attacks. It took a physical action involving someone with enough development in one or more technical advancements to create and deploy acts of terror and mayhem.
Physical attacks come from within the confines of a facility. Disgruntled workers, friends, relatives and neighbors connected with a government or civilian facility. Temporary effects as it may seem the physical attacks in nature pose a threat to the environment that surrounds the target. Collateral damage comes in forms like bystanders being in the wrong place at the wrong time along with the loss of revenue, cost to rebuilding, data recovery, people and nature in some cases. Physical attacks happen when a facility needs be shut down for a purpose at a specified time, for a specified reason. The extra that comes with it is cause and effect.
September 11, 2001 is an example of such an event that devastated thousand, and thousands more that were related to the causalities. America is an example to the world. Nations look to the US as a Big Brother. Others feel threatened by this. Combating threats weather they are physical, electronic or cyber in one way or another will always be in nature an avenue for attacks. Welcome to the World of the Tech!
Clark, D. (2003, June 3). Computer Security Officials Discount Chances of ‘Digital Pearl Harbor. Retrieved July 12, 2011 , from http://www.GovExec.com