SlideShare a Scribd company logo
Before you begin read the following articles:
The Mirai botnet explained: How teen scammers and CCTV
cameras almost brought down the internet
19 Mirai Botnet Authors Avoid Jail Time
You have been asked to provide a short presentation for
Business Leaders Round Table meeting in your community. The
topic of the meeting is Emerging Cybersecurity Threats and
What Businesses Need to Know. Your presentation will be part
of a series of talks about the risks associated with unsecured
cyber-physical systems. The organizers have asked you to begin
by presenting an overview of the Mirai Botnet attacks followed
by a discussion of threats and vulnerabilities which have been
found in cyber-physical systems used to manage buildings and
utilities.
For this briefing, you will need to find and use three additional
authoritative sources that provide information about threats,
attacks, and vulnerabilities affecting cyber-physical systems.
Format your presentation as a background paper to be shared
with attendees. The target length as specified by the meeting
organizers is 5 to 7 paragraphs in length.
Post your paper as a reply to this topic. Remember to cite your
sources and include a reference list at the end of your posting.

More Related Content

Similar to Before you begin read the following articlesThe Mirai botnet ex.docx

International Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docxInternational Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docx
vrickens
 
The Future of Digital Freedom
The Future of Digital FreedomThe Future of Digital Freedom
The Future of Digital Freedom
Mike Linksvayer
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
SsendiSamuel
 
Summarization Techniques for Code, Change, Testing and User Feedback - VSS ...
Summarization Techniques  for Code, Change, Testing  and User Feedback - VSS ...Summarization Techniques  for Code, Change, Testing  and User Feedback - VSS ...
Summarization Techniques for Code, Change, Testing and User Feedback - VSS ...
Sebastiano Panichella
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
 
MEMO[date][Your name and course numbersection][
MEMO[date][Your name and course numbersection][MEMO[date][Your name and course numbersection][
MEMO[date][Your name and course numbersection][
AbramMartino96
 
How_effective_are_policies_which_increas
How_effective_are_policies_which_increasHow_effective_are_policies_which_increas
How_effective_are_policies_which_increas
Ivan Rainovski
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
Felipe Prado
 
Emerging markets microsoft’s evolving china strategy strat
Emerging markets microsoft’s evolving china strategy stratEmerging markets microsoft’s evolving china strategy strat
Emerging markets microsoft’s evolving china strategy strat
mehek4
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
Varun Mithran
 
Issues in Cloud Technology and Cybersecurity
Issues in Cloud Technology and CybersecurityIssues in Cloud Technology and Cybersecurity
Issues in Cloud Technology and Cybersecurity
Daniel Cervera
 
In our course so far, we have taken a voyage helping us to underst.docx
In our course so far, we have taken a voyage helping us to underst.docxIn our course so far, we have taken a voyage helping us to underst.docx
In our course so far, we have taken a voyage helping us to underst.docx
jaggernaoma
 
Cyber Threat Intelligence - La rilevanza del dato per il business
Cyber Threat  Intelligence - La rilevanza del dato per il businessCyber Threat  Intelligence - La rilevanza del dato per il business
Cyber Threat Intelligence - La rilevanza del dato per il business
Francesco Faenzi
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
Robinson069
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
GeorgeDixon99
 
Understanding the Botnet Phenomenon
Understanding the Botnet PhenomenonUnderstanding the Botnet Phenomenon
Understanding the Botnet Phenomenon
Dr. Amarjeet Singh
 
Network security
Network securityNetwork security
Network security
LukeDaniel12
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
levimax2
 
Module 2 (footprinting)
Module 2 (footprinting)Module 2 (footprinting)
Module 2 (footprinting)
Wail Hassan
 

Similar to Before you begin read the following articlesThe Mirai botnet ex.docx (20)

International Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docxInternational Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docx
 
The Future of Digital Freedom
The Future of Digital FreedomThe Future of Digital Freedom
The Future of Digital Freedom
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Summarization Techniques for Code, Change, Testing and User Feedback - VSS ...
Summarization Techniques  for Code, Change, Testing  and User Feedback - VSS ...Summarization Techniques  for Code, Change, Testing  and User Feedback - VSS ...
Summarization Techniques for Code, Change, Testing and User Feedback - VSS ...
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
MEMO[date][Your name and course numbersection][
MEMO[date][Your name and course numbersection][MEMO[date][Your name and course numbersection][
MEMO[date][Your name and course numbersection][
 
How_effective_are_policies_which_increas
How_effective_are_policies_which_increasHow_effective_are_policies_which_increas
How_effective_are_policies_which_increas
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Emerging markets microsoft’s evolving china strategy strat
Emerging markets microsoft’s evolving china strategy stratEmerging markets microsoft’s evolving china strategy strat
Emerging markets microsoft’s evolving china strategy strat
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
Issues in Cloud Technology and Cybersecurity
Issues in Cloud Technology and CybersecurityIssues in Cloud Technology and Cybersecurity
Issues in Cloud Technology and Cybersecurity
 
In our course so far, we have taken a voyage helping us to underst.docx
In our course so far, we have taken a voyage helping us to underst.docxIn our course so far, we have taken a voyage helping us to underst.docx
In our course so far, we have taken a voyage helping us to underst.docx
 
Cyber Threat Intelligence - La rilevanza del dato per il business
Cyber Threat  Intelligence - La rilevanza del dato per il businessCyber Threat  Intelligence - La rilevanza del dato per il business
Cyber Threat Intelligence - La rilevanza del dato per il business
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
 
Understanding the Botnet Phenomenon
Understanding the Botnet PhenomenonUnderstanding the Botnet Phenomenon
Understanding the Botnet Phenomenon
 
Network security
Network securityNetwork security
Network security
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
Module 2 (footprinting)
Module 2 (footprinting)Module 2 (footprinting)
Module 2 (footprinting)
 

More from taitcandie

Below I have uploaded the example of the unad as well as a rough dr.docx
Below I have uploaded the example of the unad as well as a rough dr.docxBelow I have uploaded the example of the unad as well as a rough dr.docx
Below I have uploaded the example of the unad as well as a rough dr.docx
taitcandie
 
Below I have written the answer but I need someone to please help me.docx
Below I have written the answer but I need someone to please help me.docxBelow I have written the answer but I need someone to please help me.docx
Below I have written the answer but I need someone to please help me.docx
taitcandie
 
Below I copy and pasted my directions and then the actual homework a.docx
Below I copy and pasted my directions and then the actual homework a.docxBelow I copy and pasted my directions and then the actual homework a.docx
Below I copy and pasted my directions and then the actual homework a.docx
taitcandie
 
Below I have attached the Rubic and Grading scale. Please Provide Tu.docx
Below I have attached the Rubic and Grading scale. Please Provide Tu.docxBelow I have attached the Rubic and Grading scale. Please Provide Tu.docx
Below I have attached the Rubic and Grading scale. Please Provide Tu.docx
taitcandie
 
Below attachment is the outline. And already pasted the outline here.docx
Below attachment is the outline. And already pasted the outline here.docxBelow attachment is the outline. And already pasted the outline here.docx
Below attachment is the outline. And already pasted the outline here.docx
taitcandie
 
Below are three papers to be written.  There is no minimum on word c.docx
Below are three papers to be written.  There is no minimum on word c.docxBelow are three papers to be written.  There is no minimum on word c.docx
Below are three papers to be written.  There is no minimum on word c.docx
taitcandie
 
Below are the Rules of Engagement” referenced in the prompt.ü W.docx
Below are the Rules of Engagement” referenced in the prompt.ü W.docxBelow are the Rules of Engagement” referenced in the prompt.ü W.docx
Below are the Rules of Engagement” referenced in the prompt.ü W.docx
taitcandie
 
Below are the steps used in data mining. Please provide why each of .docx
Below are the steps used in data mining. Please provide why each of .docxBelow are the steps used in data mining. Please provide why each of .docx
Below are the steps used in data mining. Please provide why each of .docx
taitcandie
 
Below are the characteristics of Realism--pick one piece of literatu.docx
Below are the characteristics of Realism--pick one piece of literatu.docxBelow are the characteristics of Realism--pick one piece of literatu.docx
Below are the characteristics of Realism--pick one piece of literatu.docx
taitcandie
 
Below are the different level of analysis of data mining. Provid.docx
Below are the different level of analysis of data mining. Provid.docxBelow are the different level of analysis of data mining. Provid.docx
Below are the different level of analysis of data mining. Provid.docx
taitcandie
 
Below are questions based on the links provided. These are the only .docx
Below are questions based on the links provided. These are the only .docxBelow are questions based on the links provided. These are the only .docx
Below are questions based on the links provided. These are the only .docx
taitcandie
 
Below are discussion questions that my fellow classmates wrote..docx
Below are discussion questions that my fellow classmates wrote..docxBelow are discussion questions that my fellow classmates wrote..docx
Below are discussion questions that my fellow classmates wrote..docx
taitcandie
 
Bellevue Hospital Marketing and Communication PlanVe.docx
Bellevue Hospital Marketing and Communication PlanVe.docxBellevue Hospital Marketing and Communication PlanVe.docx
Bellevue Hospital Marketing and Communication PlanVe.docx
taitcandie
 
Bellevue College Chemistry 162 1 Empirical Gas La.docx
Bellevue College  Chemistry 162 1  Empirical Gas La.docxBellevue College  Chemistry 162 1  Empirical Gas La.docx
Bellevue College Chemistry 162 1 Empirical Gas La.docx
taitcandie
 
Being able to use research and apply findings to programming is the .docx
Being able to use research and apply findings to programming is the .docxBeing able to use research and apply findings to programming is the .docx
Being able to use research and apply findings to programming is the .docx
taitcandie
 
Being competitive is very different than achieving sustainable com.docx
Being competitive is very different than achieving sustainable com.docxBeing competitive is very different than achieving sustainable com.docx
Being competitive is very different than achieving sustainable com.docx
taitcandie
 
Being enrolled in the MS in Child and Adolescent Developmental Psych.docx
Being enrolled in the MS in Child and Adolescent Developmental Psych.docxBeing enrolled in the MS in Child and Adolescent Developmental Psych.docx
Being enrolled in the MS in Child and Adolescent Developmental Psych.docx
taitcandie
 
Being of a particular ethnicity or gender had a great impact on you.docx
Being of a particular ethnicity or gender had a great impact on you.docxBeing of a particular ethnicity or gender had a great impact on you.docx
Being of a particular ethnicity or gender had a great impact on you.docx
taitcandie
 
Being culturally sensitive by respecting your clients spiritual.docx
Being culturally sensitive by respecting your clients spiritual.docxBeing culturally sensitive by respecting your clients spiritual.docx
Being culturally sensitive by respecting your clients spiritual.docx
taitcandie
 
Being an Effective Agile Project LeaderYou have been asked b.docx
Being an Effective Agile Project LeaderYou have been asked b.docxBeing an Effective Agile Project LeaderYou have been asked b.docx
Being an Effective Agile Project LeaderYou have been asked b.docx
taitcandie
 

More from taitcandie (20)

Below I have uploaded the example of the unad as well as a rough dr.docx
Below I have uploaded the example of the unad as well as a rough dr.docxBelow I have uploaded the example of the unad as well as a rough dr.docx
Below I have uploaded the example of the unad as well as a rough dr.docx
 
Below I have written the answer but I need someone to please help me.docx
Below I have written the answer but I need someone to please help me.docxBelow I have written the answer but I need someone to please help me.docx
Below I have written the answer but I need someone to please help me.docx
 
Below I copy and pasted my directions and then the actual homework a.docx
Below I copy and pasted my directions and then the actual homework a.docxBelow I copy and pasted my directions and then the actual homework a.docx
Below I copy and pasted my directions and then the actual homework a.docx
 
Below I have attached the Rubic and Grading scale. Please Provide Tu.docx
Below I have attached the Rubic and Grading scale. Please Provide Tu.docxBelow I have attached the Rubic and Grading scale. Please Provide Tu.docx
Below I have attached the Rubic and Grading scale. Please Provide Tu.docx
 
Below attachment is the outline. And already pasted the outline here.docx
Below attachment is the outline. And already pasted the outline here.docxBelow attachment is the outline. And already pasted the outline here.docx
Below attachment is the outline. And already pasted the outline here.docx
 
Below are three papers to be written.  There is no minimum on word c.docx
Below are three papers to be written.  There is no minimum on word c.docxBelow are three papers to be written.  There is no minimum on word c.docx
Below are three papers to be written.  There is no minimum on word c.docx
 
Below are the Rules of Engagement” referenced in the prompt.ü W.docx
Below are the Rules of Engagement” referenced in the prompt.ü W.docxBelow are the Rules of Engagement” referenced in the prompt.ü W.docx
Below are the Rules of Engagement” referenced in the prompt.ü W.docx
 
Below are the steps used in data mining. Please provide why each of .docx
Below are the steps used in data mining. Please provide why each of .docxBelow are the steps used in data mining. Please provide why each of .docx
Below are the steps used in data mining. Please provide why each of .docx
 
Below are the characteristics of Realism--pick one piece of literatu.docx
Below are the characteristics of Realism--pick one piece of literatu.docxBelow are the characteristics of Realism--pick one piece of literatu.docx
Below are the characteristics of Realism--pick one piece of literatu.docx
 
Below are the different level of analysis of data mining. Provid.docx
Below are the different level of analysis of data mining. Provid.docxBelow are the different level of analysis of data mining. Provid.docx
Below are the different level of analysis of data mining. Provid.docx
 
Below are questions based on the links provided. These are the only .docx
Below are questions based on the links provided. These are the only .docxBelow are questions based on the links provided. These are the only .docx
Below are questions based on the links provided. These are the only .docx
 
Below are discussion questions that my fellow classmates wrote..docx
Below are discussion questions that my fellow classmates wrote..docxBelow are discussion questions that my fellow classmates wrote..docx
Below are discussion questions that my fellow classmates wrote..docx
 
Bellevue Hospital Marketing and Communication PlanVe.docx
Bellevue Hospital Marketing and Communication PlanVe.docxBellevue Hospital Marketing and Communication PlanVe.docx
Bellevue Hospital Marketing and Communication PlanVe.docx
 
Bellevue College Chemistry 162 1 Empirical Gas La.docx
Bellevue College  Chemistry 162 1  Empirical Gas La.docxBellevue College  Chemistry 162 1  Empirical Gas La.docx
Bellevue College Chemistry 162 1 Empirical Gas La.docx
 
Being able to use research and apply findings to programming is the .docx
Being able to use research and apply findings to programming is the .docxBeing able to use research and apply findings to programming is the .docx
Being able to use research and apply findings to programming is the .docx
 
Being competitive is very different than achieving sustainable com.docx
Being competitive is very different than achieving sustainable com.docxBeing competitive is very different than achieving sustainable com.docx
Being competitive is very different than achieving sustainable com.docx
 
Being enrolled in the MS in Child and Adolescent Developmental Psych.docx
Being enrolled in the MS in Child and Adolescent Developmental Psych.docxBeing enrolled in the MS in Child and Adolescent Developmental Psych.docx
Being enrolled in the MS in Child and Adolescent Developmental Psych.docx
 
Being of a particular ethnicity or gender had a great impact on you.docx
Being of a particular ethnicity or gender had a great impact on you.docxBeing of a particular ethnicity or gender had a great impact on you.docx
Being of a particular ethnicity or gender had a great impact on you.docx
 
Being culturally sensitive by respecting your clients spiritual.docx
Being culturally sensitive by respecting your clients spiritual.docxBeing culturally sensitive by respecting your clients spiritual.docx
Being culturally sensitive by respecting your clients spiritual.docx
 
Being an Effective Agile Project LeaderYou have been asked b.docx
Being an Effective Agile Project LeaderYou have been asked b.docxBeing an Effective Agile Project LeaderYou have been asked b.docx
Being an Effective Agile Project LeaderYou have been asked b.docx
 

Recently uploaded

Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 

Recently uploaded (20)

Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 

Before you begin read the following articlesThe Mirai botnet ex.docx

  • 1. Before you begin read the following articles: The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet 19 Mirai Botnet Authors Avoid Jail Time You have been asked to provide a short presentation for Business Leaders Round Table meeting in your community. The topic of the meeting is Emerging Cybersecurity Threats and What Businesses Need to Know. Your presentation will be part of a series of talks about the risks associated with unsecured cyber-physical systems. The organizers have asked you to begin by presenting an overview of the Mirai Botnet attacks followed by a discussion of threats and vulnerabilities which have been found in cyber-physical systems used to manage buildings and utilities. For this briefing, you will need to find and use three additional authoritative sources that provide information about threats, attacks, and vulnerabilities affecting cyber-physical systems. Format your presentation as a background paper to be shared with attendees. The target length as specified by the meeting organizers is 5 to 7 paragraphs in length. Post your paper as a reply to this topic. Remember to cite your sources and include a reference list at the end of your posting.